NordVPN has found billions of ad tracking cookies leaked on the dark web. At least 1.5 billion were from the U.S.
Here's one more reason to say goodbye to tracking browser cookies.
The Microsoft Bing Chatbot powered by AI is being injected with malicious ads that promote fake download sites to distribute malware.
The Royal Ransomware group used Google Ads in a malvertising campaign attack, according to a report published by the Microsoft's Security Threat Intelligence team.
U.S. and U.K. security teams revealed the threat on Wednesday, but did not link it to the Ukraine invasion.
There has been a 55% increase in phishing kits imitating Amazon in October and November, Egress reports.
Among regular TV sports viewers, 83% access illegal pirated streaming content at least once a week across the globe either paid-for or free, a recent report finds. The Middle East and North Africa
have the highest rates of sports pirated content. "With more than half of all fans regularly watching sports content from pirate sources, the industry faces a pressing challenge to reduce illegal
consumption and protect the value of sports rights," say the authors of the report.
Cloned versions of banks such as HSBC and Paragon Bank as well as global media sites experienced major losses and fake news this year.
Security researchers have discovered a new version of the ComRAT malware that is being used by the Russian hacker group Turla. It is controlled through the Gmail web interface.
Nearly 25% of browsers visiting an online shopping site contain malware injecting competing or conflicting ads that essentially "hijack" the customer experience that brought them there in the first
place. The finding, part of a benchmark study published by Namogoo, estimates that nearly two-thirds of those hijacks are inserting ads redirecting users to a competitor's store, while significant but
lower shares redirect them to online gambling or gaming sites, porn sites, or "error alerts" and so-called "clickjacking."
An alarming analysis of mobile apps targeting users released today by Pixalate suggests potential threats to both brand safety and national security. The analysis of the top 10,000 apps installed
from Google's PlayStore as of the first three quarters of 2019 shows many have been delisted by Google for proliferating questionable programmatic advertising, as well as serving as a vector for
distributing malware.
A new form of auto-redirect malvertising hidden in the code of programmatically served video VPAID ads through the global media platform Teads has been revealed by ad security and verification
provider GeoEdge. VPAID is a technical script that instructs a video player on what ad to play and determines the length of the ad, when to serve the ad, and where to place it. It is basically the
brains behind the function of the ad.
Explicit forms of "criminal activity," including outright fraud, malware, data privacy hacks, etc., take the greatest share of brand safety exploits, according to an analysis presented by TAG (the
Trustworthy Accountability Group) during the IAB Tech Lab's "Innovation Day," May 6 in New York City. Other high-ranking brand-safety categories include "negative press" coverage (4.2%), ad
placement/content adjacencies (4.18%), questionable "brand partners" (4.1%), data privacy security (3.37%), inferior ad experiences (3.1%) and ad viewability (3.0%).