dcsimg
 

AJAX Apps Ripe Targets for JavaScript Hijacking

By Lisa Vaas  |  Posted 04-02-2007 Print

WEBINAR:
On-Demand

Transforming Banks for a Digital Future: The Winners, The Losers, and the Strategies to Beat the Odds


A pervasive vulnerability that allows an attacker to take over any Web browser and silently intercept sensitive data input occurs in Web 2.0 settings from Yahoo to ASP .Net to Google, security firm Fortify says.


 

Submit a Comment

Loading Comments...
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.

By submitting your information, you agree that cioinsight.com may send you cioinsight offers via email, phone and text message, as well as email offers about other products and services that cioinsight believes may be of interest to you. cioinsight will process your information in accordance with the Quinstreet Privacy Policy.

Click for a full list of Newsletterssubmit