How can I stop clickjacking attacks?

SilverHawk

One of the people at my office apparently clicked a "Like" button on a website, and next thing I know, our customers on Facebook are complaining about the porn link we "liked" after they followed our apparent recommendation. Welcome to the clickjacking party. Is there a way to prevent clickjacking from happening, short of barring people from going online at work?

Topic: Security
Answer this Question

Answers

2 total
becker
Vote Up (3)

There are a couple of things that you can do that are really easy and will greatly decrease the risk while people are browsing.  I install the NoScript plug-in on all the browsers at my office.  We currently use Firefox, but I'm sure there is either a version of it for Chrome or a similar plug-in.  The most effective thing that you can do, in my opinion, is disable Flash.  If that generates too many complaints, at least make certain the most current version of Flash is installed and change the global security settings to "always deny" or at least "always ask".  There is also a setting in there to deny access to your machine's cam and mic.   

jimlynch
Vote Up (4)

Hi SilverHawk,

See this article about clickjacking, it includes a section on "likejacking" that you might find helpful.

Clickjacking
http://en.wikipedia.org/wiki/Clickjacking

"Likejacking, is a malicious technique of tricking users of a website into posting a Facebook status update for a site they did not intentionally mean to "like".[10] The term "likejacking" came from a comment posted by Corey Ballou[11] in the article How to "Like" Anything on the Web (Safely), which is one of the first documented postings explaining the possibility of malicious activity regarding Facebook's "like" button.[12]

According to an article in IEEE Spectrum, a solution to likejacking was developed at one of Facebook's hackathons.[13] A "Like" bookmarklet is available that avoids the possibility of likejacking present in the Facebook Like Button.[14]"

Ask a question

Join Now or Sign In to ask a question.
The mobile industry's efforts to convince lawmakers that self-regulation alone is the best way to address growing concerns over privacy-invading mobile applications appears to be running into some headwind.
A vast debit card fraud scheme that allegedly netted US$45 million has been linked to the hacking of credit card processors in the U.S. and India.
Hackers who commandeered The Onion's Twitter account used simple but effective phishing attacks to obtain passwords, according to a writeup by the publisher's technology team.
New legislation introduced by a group of U.S. lawmakers would require mobile application developers to obtain consent from consumers before collecting their personal data and to secure the data they collect.
As cyberattacks increase, victims are fighting back. But retaliation has its own consequences--and may create more damage.
Adobe has warned users of its ColdFusion application server platform of a critical vulnerability that could give unauthorized users access to sensitive files stored on their servers.
Domain registrar Name.com forced its customers to reset their account passwords on Wednesday following a security breach on the company's servers that might have resulted in customer information being compromised.
Microsoft has released a temporary fix for a zero-day vulnerability in Internet Explorer 8, which was used by hackers in a prominent attack against the U.S. Department of Labor's website.
Intruders used to creep in through ventilation ducts. Now they break in using the software that controls the ventilation.
Testing company Ixia launches high-volume DDoS tests against F5 firewalls.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+