Press ESC to close or Enter to search

Home
About Us
Services
Pricing
Tools
Resources
Contact
Get Started
Live Security Feed
Your IPDetecting...
NCSCUK organisations urged to strengthen cyber defences ALERTPhishing attacks targeting Microsoft 365 users on the rise CISACritical vulnerabilities identified in popular software NEWSRansomware groups increasingly targeting SME businesses NCSCNew guidance released for securing remote workers ALERTBusiness email compromise attacks cost UK firms millions CISAZero-day exploits require immediate patching attention NEWSAI-powered threats becoming more sophisticated in 2025 NCSCUK organisations urged to strengthen cyber defences ALERTPhishing attacks targeting Microsoft 365 users on the rise CISACritical vulnerabilities identified in popular software NEWSRansomware groups increasingly targeting SME businesses NCSCNew guidance released for securing remote workers ALERTBusiness email compromise attacks cost UK firms millions CISAZero-day exploits require immediate patching attention NEWSAI-powered threats becoming more sophisticated in 2025
View Dashboard

Clickjacking

Attacks

Attack that tricks users into clicking hidden elements by overlaying them with innocent-looking content.

Clickjacking (UI redress attack) tricks users into clicking something different from what they perceive. Attackers overlay invisible or disguised elements over legitimate content—victims think they're clicking a visible button but actually click a hidden element that performs unintended actions. This might mean unknowingly liking social media posts, enabling webcams, or authorising transactions. X-Frame-Options and Content Security Policy headers protect against clickjacking by preventing pages from being embedded in frames.

Why It Matters

The DSC Perspective:

Clickjacking is another reason to implement proper security headers on web applications. A few lines of configuration (X-Frame-Options, CSP) prevent this entire attack class.