{"id":6973,"date":"2016-09-26T17:40:43","date_gmt":"2016-09-26T17:40:43","guid":{"rendered":"https:\/\/www.techopedia.com\/definition\/clickjacking\/"},"modified":"2016-09-26T17:40:43","modified_gmt":"2016-09-26T17:40:43","slug":"clickjacking","status":"publish","type":"definition","link":"https:\/\/www.techopedia.com\/definition\/13584\/clickjacking","title":{"rendered":"Clickjacking"},"content":{"rendered":"
\n\tClickjacking is a type of exploit online,
\nwhere hackers hide malware or malicious code in a legitimate-looking control on
\na website. This involves the injection of Trojan horse code into the source
\ncode for the site. Various kinds of clickjacking allows hackers to trick
\nusers into doing things like changing a status on Facebook, or even sending
\nmoney from their bank accounts.\n<\/p>\n
Clickjacking is also known as a user interface redress attack.\n<\/p>\n
In clickjacking, the code attached to the control triggers events that are never described in the user interface. This is something new to most computer users, who have always assumed that a visual control means what it looks like it means on the web, and that these visual icons are inherently tied to their functions, or immune from manipulation. One excellent example is the buttons used to close or minimize web browser windows. In a pop-up ad or in some other frame, the hacker can attach code to this button so that clicking has some unanticipated effect.\n<\/p>\n
To guard against clickjacking, some experts recommend disabling scripting and I-frames in browsers, or installing certain plug-ins such as NoScript in Mozilla Firefox. It is also suggested that an \u201cX frame options\u201d header should be sent to authenticate allowances for framing of content. A code command for \u201cX Frame Options: Deny\u201d can protect systems in some ways against clickjacking.<\/p>\n","protected":false},"excerpt":{"rendered":"
What Does Clickjacking Mean? Clickjacking is a type of exploit online, where hackers hide malware or malicious code in a legitimate-looking control on a website. This involves the injection of Trojan horse code into the source code for the site. Various kinds of clickjacking allows hackers to trick users into doing things like changing a […]<\/p>\n","protected":false},"author":7813,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","om_disable_all_campaigns":false,"footnotes":""},"definitioncat":[255,218,245],"class_list":["post-6973","definition","type-definition","status-publish","format-standard","hentry","definitioncat-cyber-threats","definitioncat-cybersecurity","definitioncat-internet"],"acf":[],"yoast_head":"\n