According to Giorgio Maone, an Italian security researcher who wrote and maintains the program, Version 220.127.116.11 of the software will stop clickjacking attacks, which sees users accidentally clicking on malicious, invisible links while browsing the web.
Clickjacking has been known for several years but is drawing attention again after two security researchers, Robert Hansen and Jeremiah Grossman, warned last month of new scenarios that could compromise a person's privacy or even worse, steal money from a bank account.
Unfortunately, clickjacking is possible due to a fundamental design feature in HTML that allows websites to embed content from other web pages, Maone said. Nearly all web browsers are vulnerable to a clickjacking attack.
"It's a very hard thing to fix because it's part of the very fabric of the web and the browser," Maone said.
The embedded content can be invisible but a person can still unknowingly interact with it. A clickjacking attack takes advantage of that by tricking a user into clicking on a button that appears to do some function but actually does something entirely different.
Clickjacking can also be accomplished by manipulating the plug-ins of other applications, such as Adobe's Flash program and Microsoft's Silverlight. For example, researchers in recent days have shown it's possible for a clickjacking attack to turn on a person's web camera and microphone without their knowledge.
Adobe said this week it will issue a patch for Flash by the end of the month.
NEXT PAGE: How website owners can protect their users
NoScript, the security add-on for Firefox, has been upgraded to protect against clickjacking.
The new improvement to NoScript, called ClearClick, can detect if there is a hidden, embedded element within the web page. It then displays a warning message asking the user if they still want to click on it.
Maone said ClearClick will likely stop all clickjacking attempts. NoScript is only for the Firefox browser, so users of Microsoft's Internet Explorer - the most-used browser in the world - are vulnerable.
Website owners, however, can take one step to prevent their users from falling victim, Maone said. Programmers can use a script on their websites that checks to see if a web page is embedded in another page. If so, the script forces the good web page in front, preventing clickjacking, Maone said.
The technique is called 'framebusting'. Ebay's online payments service, PayPal, which is frequently targeted by cybercriminals, has already implemented framebusting, Maone said. NoScript will allow a framebusting script to run, Maone said.
"The best thing that can happen is that website owners start to think more carefully about security," Maone said. "It is important that website owners spread the word that they should implement framebusting."
Clickjacking is a serious, potentially long-term problem for browser developers. Since the attack is enabled by a feature within HTML, it demands changes to the HTML specification.
Web standards groups are currently working on HTML 5, a specification that will incorporate new features into the programming language to accommodate future web design. But the standards process moves slowly, and changes to HTML could break existing web pages, Maone said.
"For the user, I'm afraid there's no fix but NoScript for the time being," he said.