From: ~BD~ on

"The Real Truth MVP" <trt(a)void.com> wrote in message
news:i0j55q$tm8$1(a)leythos.motzarella.org...
>A Firefox developer is warning of a new kind of phishing attack that
>preys on users' inattention to which tabs they have open in their
>browsers. The attack is perpetrated by JavaScript code in a
>specially-crafted page. When users have several tabs open and are not
>viewing the site with the malicious code, the code surreptitiously
>changes the destination page after several minutes of inactivity; the
>favicon and title of the page are changed as well. The attack can be
>made more personal by perusing users' browsing histories and making the
>page appear to be one that the user frequents, such as Facebook or a
>banking login page. When the user goes back to the tab, there is a
>sign-on screen asking for login credentials. The vulnerability affects
>all major browsers that run on Mac OS X and Windows.
>
> How the Attack Works
>
> 1.A user navigates to your normal looking site.
>
> 2.You detect when the page has lost its focus and hasn't been
> interacted with for a while.
>
> 3.Replace the favicon with the Gmail favicon, the title with "Gmail:
> Email from Google", and the page with a Gmail login look-a-like. This
> can all be done with just a little bit of Javascript that takes place
> instantly.
>
> 4.As the user scans their many open tabs, the favicon and title act as
> a strong visual cue-memory is malleable and moldable and the user will
> most likely simply think they left a Gmail tab open. When they click
> back to the fake Gmail tab, they'll see the standard Gmail login page,
> assume they've been logged out, and provide their credentials to log
> in. The attack preys on the perceived immutability of tabs.
>
> 5.After the user has entered their login information and you've sent
> it back to your server, you redirect them to Gmail. Because they were
> never logged out in the first place, it will appear as if the login
> was successful.
>
>
>
> The referenced article below gives more details and methods of
> avoiding being tabnabbed. Primarily, if an open tab requests a login
> when you return to it close the tab and go directly to the site.
>
> http://www.computerworld.com/s/article/9177398/How_to_foil_Web_browser_tabnapping_?taxonomyId=85
>

Thank you for advising of same TRT

If you have time, would you please post to my pals in
alt.politics.scorched-earth?

Cheers

Dave

From: Peter Foldes on
BD

You stupid stupid little man. You now proved for the umpteenth time that you have no
brains or a backbone. You friggin 2 faced thief,liar and Troll

--
Peter

Please Reply to Newsgroup for the benefit of others
Requests for assistance by email can not and will not be acknowledged.
http://www.microsoft.com/protect

"~BD~" <Boater_Dave(a)hotmail.co.uk> wrote in message
news:i0j6n5$cfc$1(a)news.eternal-september.org...
>
> "The Real Truth MVP" <trt(a)void.com> wrote in message
> news:i0j55q$tm8$1(a)leythos.motzarella.org...
>>A Firefox developer is warning of a new kind of phishing attack that preys on
>>users' inattention to which tabs they have open in their browsers. The attack is
>>perpetrated by JavaScript code in a specially-crafted page. When users have
>>several tabs open and are not viewing the site with the malicious code, the code
>>surreptitiously changes the destination page after several minutes of inactivity;
>>the favicon and title of the page are changed as well. The attack can be made more
>>personal by perusing users' browsing histories and making the page appear to be
>>one that the user frequents, such as Facebook or a banking login page. When the
>>user goes back to the tab, there is a sign-on screen asking for login credentials.
>>The vulnerability affects all major browsers that run on Mac OS X and Windows.
>>
>> How the Attack Works
>>
>> 1.A user navigates to your normal looking site.
>>
>> 2.You detect when the page has lost its focus and hasn't been interacted with for
>> a while.
>>
>> 3.Replace the favicon with the Gmail favicon, the title with "Gmail: Email from
>> Google", and the page with a Gmail login look-a-like. This can all be done with
>> just a little bit of Javascript that takes place instantly.
>>
>> 4.As the user scans their many open tabs, the favicon and title act as a strong
>> visual cue-memory is malleable and moldable and the user will most likely simply
>> think they left a Gmail tab open. When they click back to the fake Gmail tab,
>> they'll see the standard Gmail login page, assume they've been logged out, and
>> provide their credentials to log in. The attack preys on the perceived
>> immutability of tabs.
>>
>> 5.After the user has entered their login information and you've sent it back to
>> your server, you redirect them to Gmail. Because they were never logged out in
>> the first place, it will appear as if the login was successful.
>>
>>
>>
>> The referenced article below gives more details and methods of avoiding being
>> tabnabbed. Primarily, if an open tab requests a login when you return to it close
>> the tab and go directly to the site.
>>
>> http://www.computerworld.com/s/article/9177398/How_to_foil_Web_browser_tabnapping_?taxonomyId=85
>>
>
> Thank you for advising of same TRT
>
> If you have time, would you please post to my pals in alt.politics.scorched-earth?
>
> Cheers
>
> Dave