Margaret Rouse is an award-winning technical writer and teacher known for her ability to explain complex technical subjects simply to a non-technical, business audience. Over…
Clickjacking is a type of exploit online,
where hackers hide malware or malicious code in a legitimate-looking control on
a website. This involves the injection of Trojan horse code into the source
code for the site. Various kinds of clickjacking allows hackers to trick
users into doing things like changing a status on Facebook, or even sending
money from their bank accounts.
Clickjacking is also known as a user interface redress attack.
In clickjacking, the code attached to the control triggers events that are never described in the user interface. This is something new to most computer users, who have always assumed that a visual control means what it looks like it means on the web, and that these visual icons are inherently tied to their functions, or immune from manipulation. One excellent example is the buttons used to close or minimize web browser windows. In a pop-up ad or in some other frame, the hacker can attach code to this button so that clicking has some unanticipated effect.
To guard against clickjacking, some experts recommend disabling scripting and I-frames in browsers, or installing certain plug-ins such as NoScript in Mozilla Firefox. It is also suggested that an “X frame options” header should be sent to authenticate allowances for framing of content. A code command for “X Frame Options: Deny” can protect systems in some ways against clickjacking.
Techopedia’s editorial policy is centered on delivering thoroughly researched, accurate, and unbiased content. We uphold strict sourcing standards, and each page undergoes diligent review by our team of top technology experts and seasoned editors. This process ensures the integrity, relevance, and value of our content for our readers.
Margaret is an award-winning technical writer and teacher known for her ability to explain complex technical subjects to a non-technical business audience. Over the past twenty years, her IT definitions have been published by Que in an encyclopedia of technology terms and cited in articles by the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine, and Discovery Magazine. She joined Techopedia in 2011. Margaret's idea of a fun day is helping IT and business professionals learn to speak each other’s highly specialized languages.
What are Tactics, Techniques, and Procedures (TTPs)? Tactics, techniques, and procedures (TTPs) are the strategic plans, methodologies, and actions an...
Margaret RouseTechnology Expert
What is AI Jacking? AI jacking is a new cybersecurity term that explains a specific kind of cyberattack targeting artificial...
Maria WebbTechnology journalist
What is a QR Code Phishing? QR code phishing, also known as quishing, is a type of cyberattack that involves...
Trending NewsLatest GuidesReviewsTerm of the Day