CIP Cyber

ClickJacking

Table of Contents

There are different web-based threat present and in this article i will discuss about ClickJacking, the growing threat that has been discussed at the OWASP NYC AppSec 2008 Conference.

The word ClickJacking is simply derived from Click+Hijacking. In short ClickJacking is a web-based coding technique that present user’s to buttons and images to click it on and do something different.



By clickJacking an attacker try to steal your sensitive data. Since it is an web based attack so everyone can affect regardless of operating system.

Example  
The user receives an email with a link to a video about a news item, but another valid page, say a product page on amazon.com, can be “hidden” on top or underneath the “PLAY” button of the news video. The user tries to “play” the video but actually “buys” the product from Amazon.         
    -Wikipedia

Video Demonstration
 

Protection

JavaScript is used by many websites for the different purposes if you disable it than you can avoid to infect by clickJacking. But it is not legitimate solution to do this.
The best technique to protect your self from clickjacking is to use a script called NoScript, It is a free add-in for Firefox browser.




Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
CIP Cyber Staff

CIP Cyber Staff

CIP Cyber Staff comprises CIP cybersecurity experts committed to delivering comprehensive information on critical infrastructure protection. The content covers diverse topics, equipping professionals to defend organizations and communities in an ever-evolving cyber landscape.

Most popular

Industrial Cybersecurity

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

Related Articles

What Proxies Are For

When you cannot access certain sites or hide your identity, you need a tool for that. For example, the USA proxies are in demand among

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings