	{"id":450,"date":"2008-10-08T12:57:19","date_gmt":"2008-10-08T11:57:19","guid":{"rendered":"http:\/\/blog.intego.com\/?p=450"},"modified":"2019-09-03T12:17:27","modified_gmt":"2019-09-03T19:17:27","slug":"more-on-clickjacking-batten-down-the-flash-hatches","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/","title":{"rendered":"More on &#8220;Clickjacking&#8221; &#8211; batten down the Flash hatches"},"content":{"rendered":"<p>We recently <a href=\"https:\/\/www.intego.com\/mac-security-blog\/have-you-heard-of-clickjacking-its-the-latest-security-threat\/\" target=\"_blank\" rel=\"noopener\">reported on &#8220;clickjacking&#8221;<\/a>, a way to add invisible buttons to web pages, that overlay real buttons, and when you click them, something unexpected happens. Clickjacking has suddenly become a serious security issue, especially with Adobe <a href=\"https:\/\/www.adobe.com\/support\/security\/advisories\/apsa08-08.html\" target=\"_blank\" rel=\"noopener\">issuing a security advisory<\/a> about possible clickjacking in its Flash software. This vulnerability allows malicious users to hijack your microphone or camera, because Flash software allows access to these devices. You can make changes to the privacy settings on the Adobe Flash Player Settings Manager; interestingly, this software is not on your computer, but you access it by <a href=\"https:\/\/www.macromedia.com\/support\/documentation\/en\/flashplayer\/help\/settings_manager02.html\" target=\"_blank\" rel=\"noopener\">loading a web page<\/a> which contains a Flash &#8220;animation&#8221; that changes settings on your computer.<\/p>\n<p>In more clickjacking news, <a href=\"https:\/\/securosis.com\/blog\/clickjacking-details-analysis-and-advice\" target=\"_blank\" rel=\"noopener\">Securosis<\/a> gives an overview of what clickjacking is and how it works. Their one-sentence explanation is especially clear: &#8220;Clickjacking allows someone to place an invisible link\/button below your mouse as you browse a regular page.&#8221; The post then goes on to give more technical details and examples. You won&#8217;t be tested on this, but it&#8217;s good to be familiar with what this term covers.<\/p>\n<p>See also <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/clickjacking\/\" target=\"_blank\" rel=\"noopener\">Intego&#8217;s other articles about clickjacking<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We recently reported on &#8220;clickjacking&#8221;, a way to add invisible buttons to web pages, that overlay real buttons, and when you click them, something unexpected happens. Clickjacking has suddenly become a serious security issue, especially with Adobe issuing a security advisory about possible clickjacking in its Flash software. This vulnerability allows malicious users to hijack [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":11049,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13,11],"tags":[4552],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"We recently reported on &quot;clickjacking&quot;, a way to add invisible buttons to web pages, that overlay real buttons, and when you click them, something\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"More on &quot;Clickjacking&quot; - batten down the Flash hatches - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"We recently reported on &quot;clickjacking&quot;, a way to add invisible buttons to web pages, that overlay real buttons, and when you click them, something\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2008-10-08T11:57:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-09-03T19:17:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/flash-logo-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/flash-logo-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/flash-logo-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/\",\"name\":\"More on \\\"Clickjacking\\\" - batten down the Flash hatches - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/#primaryimage\"},\"datePublished\":\"2008-10-08T11:57:19+00:00\",\"dateModified\":\"2019-09-03T19:17:27+00:00\",\"description\":\"We recently reported on \\\"clickjacking\\\", a way to add invisible buttons to web pages, that overlay real buttons, and when you click them, something\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"More on &#8220;Clickjacking&#8221; &#8211; batten down the Flash hatches\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"More on &#8220;Clickjacking&#8221; &#8211; batten down the Flash hatches\",\"datePublished\":\"2008-10-08T11:57:19+00:00\",\"dateModified\":\"2019-09-03T19:17:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/#webpage\"},\"wordCount\":195,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/flash-logo-thumb.jpg\",\"keywords\":[\"Clickjacking\"],\"articleSection\":[\"Security &amp; Privacy\",\"Software &amp; Apps\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"We recently reported on \"clickjacking\", a way to add invisible buttons to web pages, that overlay real buttons, and when you click them, something","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/","og_locale":"en_US","og_type":"article","og_title":"More on \"Clickjacking\" - batten down the Flash hatches - The Mac Security Blog","og_description":"We recently reported on \"clickjacking\", a way to add invisible buttons to web pages, that overlay real buttons, and when you click them, something","og_url":"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/","og_site_name":"The Mac Security Blog","article_published_time":"2008-10-08T11:57:19+00:00","article_modified_time":"2019-09-03T19:17:27+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/flash-logo-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/flash-logo-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/flash-logo-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/","name":"More on \"Clickjacking\" - batten down the Flash hatches - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/#primaryimage"},"datePublished":"2008-10-08T11:57:19+00:00","dateModified":"2019-09-03T19:17:27+00:00","description":"We recently reported on \"clickjacking\", a way to add invisible buttons to web pages, that overlay real buttons, and when you click them, something","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"More on &#8220;Clickjacking&#8221; &#8211; batten down the Flash hatches"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"More on &#8220;Clickjacking&#8221; &#8211; batten down the Flash hatches","datePublished":"2008-10-08T11:57:19+00:00","dateModified":"2019-09-03T19:17:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/#webpage"},"wordCount":195,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/more-on-clickjacking-batten-down-the-flash-hatches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/flash-logo-thumb.jpg","keywords":["Clickjacking"],"articleSection":["Security &amp; Privacy","Software &amp; Apps"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/flash-logo-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-7g","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/450"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=450"}],"version-history":[{"count":3,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/450\/revisions"}],"predecessor-version":[{"id":89491,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/450\/revisions\/89491"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/11049"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=450"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}