In other words, the hacker would dupe users into visiting a malicious page -- through the usual methods -- but then hide the nasty bits under what appears to be the real-deal content from a legitimate site.
How bad is clickjacking? Another good question, but again, the answer's a little dodgy. "Attackers can do quite a lot," Grossman said in a blog post two weeks ago when he and Hansen announced that they had pulled their presentation. "Some things that could be pretty spooky."
Not everyone's convinced that this is a big deal, however. "The difficult thing is finding out what to do with this," said Dave Aitel, CTO at Immunity Inc., in a message to his Dailydave mailing list on Thursday.
In that same vein, there have been few sirens sounded by security teams or organizations. US-CERT, which is under the Department of Homeland Security umbrella, acknowledged the reports but had no new information, and no advice except its standing recommendations for securing a browser.
Speaking of which, what can I do to keep clickjackers back? Not much at the moment.
Of the few concrete pieces of advice that have surfaced, one requires giving up the Internet as you know it, while the other will put a serious crimp in your browsing.
The first way to protect yourself from clickjacking is to switch to Lynx, an open-source text-only browser that harks back to the Web's Dark Ages: 1992. Although Lynx is better known in the Unix/Linux world, there are versions for Mac OS X and Windows.
Clickjacking won't work if you're using Lynx, simply because there's no graphic content that an attacker can grab from it to pull over his own malicious code. But text-only browsing is, well, so last century. Hansen, however, said that the combination of Firefox and NoScript, an extension that blocks JavaScript, Flash and Java content, would keep you safe from "a very good chunk of the issues, 99.99% at this point."