Clipboard poisoning attacks on the Mac
Published June 3rd, 2016 at 7:33 AM EDT , modified June 3rd, 2016 at 7:33 AM EDT
Graham Cluley drew my attention the other day to an issue that has apparently been known to some for years, but was new to me: clipboard poisoning, an issue where a website can replace what you think is on your clipboard with something else.
Although this seems like an insignificant issue on first glance, it turns out that there are some very serious implications.
Read the full story on Malwarebytes Labs
3 Comments
This post is more than 90 days old and has been locked. No further comments are allowed.
Thanks for the forum.Really thank you! Fantastic. Votraw
Clipboard poisoning is made with flash : nor jquery, nor javascript nor HTML5 can interact with clipboard.
So install Flashcontrol on your browser 😉
That’s not correct. Read the article, please. There were two clipboard poisoning attacks described. One used Javascript, the other HTML and CSS. Both work on a machine that doesn’t have Flash installed at all.
Also, all browsers have their own plugin management features these days, which can control Flash nicely. Installing some third-party browser extension for this purpose is not needed or recommended.