AJAX Apps Ripe Targets for JavaScript Hijacking

By Lisa Vaas  |  Posted 04-02-2007 Print Email

WEBINAR: Live Event Date: September 20, 2017 @ 1:00 p.m. ET / 10:00 a.m. PT

Designing a Proactive Approach to Information Security with Cyber Threat Hunting REGISTER >

A pervasive vulnerability that allows an attacker to take over any Web browser and silently intercept sensitive data input occurs in Web 2.0 settings from Yahoo to ASP .Net to Google, security firm Fortify says.


 

Submit a Comment

Loading Comments...
Manage your Newsletters: Login Register