Abstract:
As provided herein, a user of a client device may navigate to a webpage using a browser. A browser window, populated with a verification image and/or details about the webpage, is generated and presented to the user. The verification image and/or details about the webpage differentiate a browser window generated by the browser, from the webpage, from a browser window generated by a malicious user. The browser window comprises a login box into which credentials for logging into the user account may be entered. Responsive to the user entering correct credentials into the login box and selecting a submit option based upon recognition of the verification image, the browser window may be submitted to a server and the user may be presented with a window comprising access to the user account.
Abstract:
Methods and systems for receiving sensitive information include receiving a request for entering sensitive information, the request received from a user interface rendered on a client device. The methods and systems rely upon nested iframes, each of which is hosted by a different server. An inner iframe is hosted by a server within a secure zone, such as a digital vault. A middle iframe is hosted within the secure zone and is invoked by an intermediate server. An outer iframe is hosted by a server that provides the user interface. The server that provides the user interface may be hosted by a cloud service provider, for example. Using the nested iframes and the network topology described in the present disclosure, users are able to exchange sensitive information with a server within the secure zone through a user interface provided outside the secure zone.
Abstract:
The present teaching relates to blocking malicious third party site tagging using content security policy (CSP). A request to access a web page is first received for obtaining a page resource associated with the web page. One or more tags are further added to the page resource, and one or more tag sources corresponding to the one or more tags are interpreted. Based on the one or more tag sources, at least one content security policy is constructed and enforced on the page resource. The web page is presented to the user with whitelisted tags in accordance with the enforced at least one content security policy.
Abstract:
As provided herein, a user of a client device may navigate to a webpage using a browser. A browser window, populated with a verification image and/or details about the webpage, is generated and presented to the user. The verification image and/or details about the webpage differentiate a browser window generated by the browser, from the webpage, from a browser window generated by a malicious user. The browser window comprises a login box into which credentials for logging into the user account may be entered. Responsive to the user entering correct credentials into the login box and selecting a submit option based upon recognition of the verification image, the browser window may be submitted to a server and the user may be presented with a window comprising access to the user account.
Abstract:
Methods and systems for receiving sensitive information include receiving a request for entering sensitive information, the request received from a user interface rendered on a client device. The methods and systems rely upon nested iframes, each of which is hosted by a different server. An inner iframe is hosted by a server within a secure zone, such as a digital vault. A middle iframe is hosted within the secure zone and is invoked by an intermediate server. An outer iframe is hosted by a server that provides the user interface. The server that provides the user interface may be hosted by a cloud service provider, for example. Using the nested iframes and the network topology described in the present disclosure, users are able to exchange sensitive information with a server within the secure zone through a user interface provided outside the secure zone.
Abstract:
Techniques are provided that include displaying an offer for an interest-based content subscription on an email application Web site, the offer being selectable and displayed in a native format of the email application, and, upon receiving an indication that the offer has been selected by a user, generating an interest-based content subscription without directing a browser application away from the email application Web site. According to some such arrangements, generating the interest-based content subscription may include contacting a third-party Web site associated with the offer, and communicating at least one of an actual identification and a disposable identification of the user to the third-party Web site. The interest-based content subscription may be limited based on at least one of a time duration and a frequency parameter.