<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:wfw="http://wellformedweb.org/CommentAPI/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    >

<channel>
    <title>Webmonkey &#187; clickjacking</title>
    <atom:link href="http://www.webmonkey.com/tag/clickjacking/feed/" rel="self" type="application/rss+xml" />
    <link>http://www.webmonkey.com</link>
    <description>The Web Developer&#039;s Resource</description>
    <lastBuildDate>Mon, 06 May 2013 17:29:19 +0000</lastBuildDate>
    <language>en-US</language>
    <sy:updatePeriod>hourly</sy:updatePeriod>
    <sy:updateFrequency>1</sy:updateFrequency>
    <generator>http://wordpress.org/?v=3.4.2</generator>
    
    <item>
        <title>Beware of iPhone Clickjacking: Update to 2.2</title>
        <link>http://www.webmonkey.com/2008/11/beware_of_iphone_clickjacking_update_to_2dot2/</link>
        <comments>http://www.webmonkey.com/2008/11/beware_of_iphone_clickjacking_update_to_2dot2/#comments</comments>
        <pubDate>Mon, 24 Nov 2008 19:15:25 +0000</pubDate>

                <dc:creator>Adam Duvander</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/blog/bewareofiphoneclickjackingupdateto22</guid>
        		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[bug]]></category>
		<category><![CDATA[clickjacking]]></category>
		<category><![CDATA[CSS]]></category>
		<category><![CDATA[iPhone]]></category>
        <description><![CDATA[An iPhone clickjacking attack was fixed with last week&#8217;s release of the 2.2 software. Prior versions contained a CSS transforms bug that caused iframe content to appear as part of the actual page. It looks like the bug never saw malicious use in the wild, because the developers who noticed it alerted Apple and kept [...]]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled --><img class="blogimg" src="http://howto.wired.com/mediawiki/images/Iphone-clickjacking.png" alt="Example password jacking on iPhone" />An <a href="http://ejohn.org/blog/clickjacking-iphone-attack/">iPhone clickjacking attack</a> was fixed with last week&#8217;s release of the 2.2 software. Prior versions contained a <a href="http://webkit.org/blog/130/css-transforms/">CSS transforms</a> bug that caused iframe content to appear as part of the actual page.</p>
<p>It looks like the bug never saw malicious use in the wild, because the developers who noticed it alerted Apple and kept the bug secret while it was fixed. Like other <a href="http://www.webmonkey.com/blog/A_Look_at_the__Clickjacking__Web_Attack_and_Why_You_Should_Worry">clickjacking attacks</a>, the most likely use is to get a user to inadvertently click an ad. Although, an even more dangerous example is shown to harvest passwords.</p>
<p>If the <a href="http://blog.wired.com/gadgets/2008/11/apple-releases.html">StreetView and Maps additions</a> in the latest iPhone software wasn&#8217;t enough to get you to download the free update, let this attack be reason enough.</p>
<p>Though the bug was apparently discovered by developer <a href="http://waynepan.com/">Wayne Pan</a>, it was submitted by jQuery creator John Resig. Resig just keeps showing up for his various work. In addition to jQuery, he&#8217;s <a href="http://www.webmonkey.com/blog/Resig_Brings_Structure_to_Firebug">on the Firebug team at Mozilla</a>, <a href="http://www.webmonkey.com/blog/Chrome_is_Fast__But_Not_That_Fast">performance testing browsers</a> and <a href="http://www.webmonkey.com/blog/New_JavaScript_Library_Creates_Amazing_Animations">creating JavaScript animations</a>.</p>
<p><strong>See also:</strong></p>
<ul>
<li><a href="http://www.webmonkey.com/blog/A_Look_at_the__Clickjacking__Web_Attack_and_Why_You_Should_Worry">A Look at the &#8216;Clickjacking&#8217; Web Attack and Why You Should Worry</a></li>
<li><a href="http://www.webmonkey.com/blog/Hackers_are_Watching_You:_Flash_Clickjacking_Vulnerability_Exposes_Webcams_and_Mics">Hackers Are Watching You: Flash Clickjacking Vulnerability Exposes Webcams and Mics</a></li>
<li><a href="http://www.webmonkey.com/blog/Flash_Player_10_Solves_Some__but_not_all__Clickjacking__Attacks">Flash Player 10 Solves Some, but not all &#8216;Clickjacking&#8217; Attacks</a></li>
</ul>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2008/11/beware_of_iphone_clickjacking_update_to_2dot2/feed/</wfw:commentRss>
        <slash:comments>0</slash:comments>

        
    </item>
    
    <item>
        <title>Hackers Are Watching You: Flash Clickjacking Vulnerability Exposes Webcams and Mics</title>
        <link>http://www.webmonkey.com/2008/10/hackers_are_watching_you_flash_clickjacking_vulnerability_grants_access_to_webcams_and_mics/</link>
        <comments>http://www.webmonkey.com/2008/10/hackers_are_watching_you_flash_clickjacking_vulnerability_grants_access_to_webcams_and_mics/#comments</comments>
        <pubDate>Fri, 10 Oct 2008 01:16:10 +0000</pubDate>

                <dc:creator>Scott Loganbill</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/blog/hackersarewatchingyouflashclickjackingvulnerabilityexposeswebcamsandmics</guid>
        		<category><![CDATA[Software & Tools]]></category>
		<category><![CDATA[clickjacking]]></category>
		<category><![CDATA[JavaScript]]></category>
		<category><![CDATA[Security]]></category>
        <description><![CDATA[A serious Flash Player vulnerability was exposed Thursday by online security experts. The clickjacking vulnerability gives hackers access to see and hear into your home via your web cam and microphone with only a single victim-initiated click. The vulnerability affects all browsers with Flash Player installed, approximately 99% of browsers (that means you). Adobe has [...]]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled -->A serious <a href="http://jeremiahgrossman.blogspot.com/2008/10/clickjacking-web-pages-can-see-and-hear.html">Flash Player vulnerability</a> was exposed Thursday by online security experts. The clickjacking vulnerability gives hackers access to see and hear into your home via your web cam and microphone with only a single victim-initiated click.</p>
<p>The vulnerability affects all browsers with Flash Player installed, <a href="http://www.adobe.com/products/player_census/flashplayer/">approximately 99% of browsers</a> (that means you). Adobe has <a href="http://www.adobe.com/support/security/advisories/apsa08-08.html">responded with the following instructions</a>, which turns off all webcam and mic access from the internet:</p>
<blockquote>
<ol>
<li>Access the Global Privacy Settings panel of the Adobe Flash Player Settings Manager at the following URL: <a href="http://www.adobe.com/support/documentation/en/flashplayer/help/settings_manager02.html">http://www.adobe.com/support/documentation/en/flashplayer/help/settings_manager02.html</a></li>
<li>Select the &#8220;Always deny&#8221; button.</li>
<li>Select ‘Confirm&#8217; in the resulting dialog.</li>
<li>Note that you will no longer be asked to allow or deny camera and / or microphone access after changing this setting. Customers who wish to allow certain sites access to their camera and / or microphone can selectively allow access to certain sites via the Website Privacy Settings panel of the Settings Manager at the following URL: <a href="http://www.adobe.com/support/documentation/en/flashplayer/help/settings_manager06.html">http://www.adobe.com/support/documentation/en/flashplayer/help/settings_manager06.html</a>.</li>
</ol>
</blockquote>
<p>Jeremiah Greene and Robert Hanson from White Hat Security found the exploit over a month ago and were prepared to present the information to a <a href="http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference">OWASP conference</a>. Adobe caught wind of the vulnerability and delayed the presentation to give its developers a chance to patch up the bug. Now, Greene and Hanson have <a href="http://jeremiahgrossman.blogspot.com/">gone public with the information</a>.</p>
<p>A video demonstration of the attack can be found on Greene&#8217;s blog and below.</p>
<p><object height="304" width="400"><param name="allowfullscreen" value="true"></param><param name="allowscriptaccess" value="always"></param><param name="movie" value="http://vimeo.com/moogaloop.swf?clip_id=1912736&amp;server=vimeo.com&amp;show_title=1&amp;show_byline=1&amp;show_portrait=0&amp;color=&amp;fullscreen=1"></param>	<embed src="http://vimeo.com/moogaloop.swf?clip_id=1912736&amp;server=vimeo.com&amp;show_title=1&amp;show_byline=1&amp;show_portrait=0&amp;color=&amp;fullscreen=1" type="application/x-shockwave-flash" allowfullscreen="true" allowscriptaccess="always" height="304" width="400"></embed></object><a href="http://vimeo.com/1912736?pg=embed&amp;sec=1912736">Clickjacking Camjack Demonstration</a> from <a href="http://vimeo.com/jeremiahgrossman?pg=embed&amp;sec=1912736">Jeremiah Grossman</a> on <a href="http://vimeo.com?pg=embed&amp;sec=1912736">Vimeo</a>.</p>
<p>&#8216;Clickjacking&#8217; is a a newly discovered threat which invisibly places poisonous links invisibly under your mouse. When you click anywhere on the infected web page, the invisible link is activated. Unsuspecting users could then unknowingly install viruses or malware thinking they clicked on a legitimate link instead.</p>
<p>The attacks use existing widely used technology, such as JavaScript events, which make the abuse widely effective and difficult to prevent. The only true way to protect yourself from being a victim of clickjacking would be to turn off JavaScript via browser preferences or plug-ins like <a href="http://noscript.net/">NoScript</a>.</p>
<p><strong>See Also:</strong></p>
<ul>
<li><a href="http://www.webmonkey.com/blog/A_Look_at_the__Clickjacking__Web_Attack_and_Why_You_Should_Worry">A Look at the &#8216;Clickjacking&#8217; Web Attack and Why You Should Worry</a></li>
<li><a href="http://www.webmonkey.com/blog/Scripting_Attacks_Plague_Even_the_Web_s_Largest_Sites">Scripting Attacks Plague Even the Web&#8217;s Largest Sites</a></li>
<li><a href="http://www.webmonkey.com/blog/Firefox_3_Highlights_Websites__Security_Failings">Firefox 3 Highlights Websites&#8217; Security Failings</a></li>
<li><a href="http://www.webmonkey.com/blog/Yahoo_Takes_on_Malware_Sites_With_New_Security_Tools">Yahoo Takes on Malware Sites With New Security Tools</a></li>
</ul>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2008/10/hackers_are_watching_you_flash_clickjacking_vulnerability_grants_access_to_webcams_and_mics/feed/</wfw:commentRss>
        <slash:comments>0</slash:comments>

        
    </item>
    </channel>
</rss>
