SlideShare une entreprise Scribd logo
1  sur  21
Know Your Malware
Protect Yourself
Amnon Siev
CEO, Geoedge
GEOEDGE CONFIDENTIAL 1
GEOEDGE CONFIDENTIAL 2
Online
Ad Verification
Mobile
Ad Verification
Video
Ad Verification
GeoEdge is the leading Ad Verification provider
for the Mobile and Online advertising ecosystem
Our Mission: To ensure a Safe, Clean and Engaging User Experience
New Offer!
Customers
• Over 700 customers worldwide
• Partnering with leading Ad Platforms
3GEOEDGE CONFIDENTIAL
The Real Cost of Malware
GEOEDGE CONFIDENTIAL 4
Direct CostsPoor User
Experience
Long Term
Impact
Cost to Publisher
Impact on User
5
Two levels:
1.User is warned
2.User is infected
GEOEDGE CONFIDENTIAL
Ransom Viruses
Bad User Experience Without Malware
6
An holistic view of the user’s experience
GEOEDGE CONFIDENTIAL
Auto-
redirects
Drive By File
downloads
Post click File
Downloads
Java script
errors
Phishing scams
Deceptive
offers
Mobile Redirect
GEOEDGE CONFIDENTIAL 7
1 Use App
See Banner2
Automatically Leaves
App…and a new
window is opened!
3
Direct Costs
8
GEOEDGE CONFIDENTIAL
Operational challenge to
track & block campaigns
Brand
Reputation &
Bad Publicity
1
2
Demand Partner blocked
Legal exposure
3
4
Long Term Impact On Your Business
Ad injections - hijack your traffic
cutting right into your bottom line
Domain spoofing - your name is
used to sell fake traffic - you can
be black listed
Often users are not aware they have
been infected
9
Long Term Impact On Your Ecosystem
10
Botnet for traffic and click fraud - malware that allows the
hackers to create “real” traffic/clicks from the user machine
This may happening
on your site!
“Traffic fraud is only a
problem for advertiser …”
ANA Report – December 2014
11
Advertisers lose faith in Premium publisher traffic!
1. CPM goes down as Advertisers factor into account fake traffic
(23% of video ads traffic is not human)
2. Complicate contracts with advertisers
BIG
PICTURE
12
I’m not at risk…
Common misconceptions
GEOEDGE CONFIDENTIAL
Misconception #1: Manual pre-lunch checks
Hacker buys
ad space on
your site
Campaign is
launched
User accesses
your site
From: France
Browser: IE
Time: 2 PM
Infected: No
User accesses
your site
From: Canada
Browser: Chrome
Time: 1 AM
Infected: Yes
Hacker injects
malicious code
targeting a specific
user segment
Malware attacks are
dynamic and usually starts
after the campaign go live.
Manual check is meaningless as
malware will probably target
specific user segment
Malware!
Misconception #2: Ad server protection
14
I’m protected because I’m using my
ad server malware detection
GEOEDGE CONFIDENTIAL
MALWARE
Ad server protection limitation
15
3rd Party
Ad servers
Tag
`
Tag
Tag
Tag
Publishers
Ad Server
Nuclear Exploit Kit landing page
Ad server protection limitation - example
GEOEDGE CONFIDENTIAL 16
September 2014:
Last.fm & Jerusalem Post
attack via Double Click that called Zedo
Pubads.g.doubleclick.net
d3.zedo.com/jsc/d3/fo.js (compromised)
Static.the-button.com/d2.php
[string].wiab-service.se/geobalance/geo2.php
Misconception #3: Direct Campaigns
17
I’m protected because I’m serving campaigns
directly from my in house platform
GEOEDGE CONFIDENTIAL
 Landing page – post click attacks are more common than pre click!
 You are exposed via other 3rd party code on your site
 Your infrastructure could be hacked
Misconception #4: Trusted Demand Partners
18
I’m protected because I trust my
demand-partners protection
GEOEDGE CONFIDENTIAL
 Demand-partner’s protection is limited
 Protection systems are based on scans – your traffic is a small portion of
their traffic and scanned accordingly.
 Many malware attacks come through reputable demand partners and SSPs:
Jan 2015 – AOL: Drive-by malware downloads to the Huffington Post,
GameZone, LA Weekly,
So What Can Be Done?
19
1. Use proactive protection
2. Understand the implications for users. It’s not enough just to know that
there was an attack
3. Find the infected campaign – HOW?
4. Track the bad player – of all the mediators who could be responsible
5. Block Campaign
GEOEDGE CONFIDENTIAL
 Holistic view of the user’s
experience
 Full transparency
 Detection AND
recommendation
 Pinpoint malicious source
 Multi-format protection
 New VIDEO verification
Super exciting NEWs from GeoEdge
20
First ad verification service that will provide TRUE
transparency and verification for Video Ads!
Video Malware Protection
Protect against bad user experience
• Auto play with/out sound
• Ad length / size
Protect Publisher Video Revenues
• Identify player inside banner
GEOEDGE CONFIDENTIAL
21
w w w. geoedge. com
GEOEDGE CONFIDENTIAL

Contenu connexe

En vedette

How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service AttacksBrent Muir
 
An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacksRollingsherman
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackAhmed Ghazey
 
Wordpress malware - What is it and how to protect your website.
Wordpress malware - What is it and how to protect your website.Wordpress malware - What is it and how to protect your website.
Wordpress malware - What is it and how to protect your website.Owen Cutajar
 

En vedette (11)

MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 
An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacks
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Malware
MalwareMalware
Malware
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
Wordpress malware - What is it and how to protect your website.
Wordpress malware - What is it and how to protect your website.Wordpress malware - What is it and how to protect your website.
Wordpress malware - What is it and how to protect your website.
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 

Similaire à Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15

Kickoff Workshop with GeoEdge: Beyond the Banner: Verify Your Ad Quality When...
Kickoff Workshop with GeoEdge: Beyond the Banner: Verify Your Ad Quality When...Kickoff Workshop with GeoEdge: Beyond the Banner: Verify Your Ad Quality When...
Kickoff Workshop with GeoEdge: Beyond the Banner: Verify Your Ad Quality When...Digiday
 
IRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection MethodsIRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection MethodsIRJET Journal
 
PC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To CompromisePC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To CompromiseTrend Micro
 
Malvertisement the covert advert
Malvertisement the covert advertMalvertisement the covert advert
Malvertisement the covert advertizoologic
 
CYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_ReportCYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_ReportChris Taylor
 
Everything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeepEverything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeepIvanti
 
2012 ab is-your-browser-putting-you-at-risk-pt2
2012 ab is-your-browser-putting-you-at-risk-pt22012 ab is-your-browser-putting-you-at-risk-pt2
2012 ab is-your-browser-putting-you-at-risk-pt2Комсс Файквэе
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeF-Secure Corporation
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablowISSA LA
 
An Insider's Guide to Video Advertising
An Insider's Guide to Video AdvertisingAn Insider's Guide to Video Advertising
An Insider's Guide to Video AdvertisingOrigami Logic
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile AttackIRJET Journal
 
Introduction to malvertising
Introduction to malvertising Introduction to malvertising
Introduction to malvertising Mohd Arif
 
Know More About Malvertising!
Know More About Malvertising!Know More About Malvertising!
Know More About Malvertising!Nicole Payne
 
7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTEDbugcrowd
 
What is online ad fraud and what does um do about it
What is online ad fraud and what does um do about itWhat is online ad fraud and what does um do about it
What is online ad fraud and what does um do about itAlan King
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperHarsimran Walia
 

Similaire à Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15 (20)

Kickoff Workshop with GeoEdge: Beyond the Banner: Verify Your Ad Quality When...
Kickoff Workshop with GeoEdge: Beyond the Banner: Verify Your Ad Quality When...Kickoff Workshop with GeoEdge: Beyond the Banner: Verify Your Ad Quality When...
Kickoff Workshop with GeoEdge: Beyond the Banner: Verify Your Ad Quality When...
 
IRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection MethodsIRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection Methods
 
PC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To CompromisePC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To Compromise
 
Malvertisement the covert advert
Malvertisement the covert advertMalvertisement the covert advert
Malvertisement the covert advert
 
CYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_ReportCYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_Report
 
Everything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeepEverything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeep
 
2012 ab is-your-browser-putting-you-at-risk-pt2
2012 ab is-your-browser-putting-you-at-risk-pt22012 ab is-your-browser-putting-you-at-risk-pt2
2012 ab is-your-browser-putting-you-at-risk-pt2
 
Malvertising: The Hidden Threat
Malvertising: The Hidden ThreatMalvertising: The Hidden Threat
Malvertising: The Hidden Threat
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat Landscape
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablow
 
An Insider's Guide to Video Advertising
An Insider's Guide to Video AdvertisingAn Insider's Guide to Video Advertising
An Insider's Guide to Video Advertising
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile Attack
 
Introduction to malvertising
Introduction to malvertising Introduction to malvertising
Introduction to malvertising
 
Spyware
SpywareSpyware
Spyware
 
Know More About Malvertising!
Know More About Malvertising!Know More About Malvertising!
Know More About Malvertising!
 
7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED
 
Gg2511351142
Gg2511351142Gg2511351142
Gg2511351142
 
Gg2511351142
Gg2511351142Gg2511351142
Gg2511351142
 
What is online ad fraud and what does um do about it
What is online ad fraud and what does um do about itWhat is online ad fraud and what does um do about it
What is online ad fraud and what does um do about it
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaper
 

Plus de Digiday

Amazon Strategies January 2019 | Sellwin
Amazon Strategies January 2019 | SellwinAmazon Strategies January 2019 | Sellwin
Amazon Strategies January 2019 | SellwinDigiday
 
Amazon Strategies January 2019 | OneSpace
Amazon Strategies January 2019 | OneSpaceAmazon Strategies January 2019 | OneSpace
Amazon Strategies January 2019 | OneSpaceDigiday
 
Amazon Strategies January 2019 | Tatari
Amazon Strategies January 2019 | TatariAmazon Strategies January 2019 | Tatari
Amazon Strategies January 2019 | TatariDigiday
 
Amazon Strategies January 2019 | 23andme
Amazon Strategies January 2019 | 23andmeAmazon Strategies January 2019 | 23andme
Amazon Strategies January 2019 | 23andmeDigiday
 
Amazon Strategies January 2019 | Booyah
Amazon Strategies January 2019 | BooyahAmazon Strategies January 2019 | Booyah
Amazon Strategies January 2019 | BooyahDigiday
 
Amazon Strategies January 2019 | Publicis
Amazon Strategies January 2019 | PublicisAmazon Strategies January 2019 | Publicis
Amazon Strategies January 2019 | PublicisDigiday
 
Amazon Strategies January 2019 | Perpetua
Amazon Strategies January 2019 | PerpetuaAmazon Strategies January 2019 | Perpetua
Amazon Strategies January 2019 | PerpetuaDigiday
 
Amazon Strategies January 2019 | Podean
Amazon Strategies January 2019 | PodeanAmazon Strategies January 2019 | Podean
Amazon Strategies January 2019 | PodeanDigiday
 
Amazon Strategies January 2019 | eos
Amazon Strategies January 2019 | eosAmazon Strategies January 2019 | eos
Amazon Strategies January 2019 | eosDigiday
 
Amazon Strategies January 2019 | iCrossing
Amazon Strategies January 2019 | iCrossingAmazon Strategies January 2019 | iCrossing
Amazon Strategies January 2019 | iCrossingDigiday
 
Amazon Strategies January 2019 | Dash Hudson
Amazon Strategies January 2019 | Dash HudsonAmazon Strategies January 2019 | Dash Hudson
Amazon Strategies January 2019 | Dash HudsonDigiday
 
Amazon Strategies January 2019 | Direct Agents & Carhartt
Amazon Strategies January 2019 | Direct Agents & CarharttAmazon Strategies January 2019 | Direct Agents & Carhartt
Amazon Strategies January 2019 | Direct Agents & CarharttDigiday
 
Amazon Strategies January 2019 | WellPath
Amazon Strategies January 2019 | WellPathAmazon Strategies January 2019 | WellPath
Amazon Strategies January 2019 | WellPathDigiday
 
Amazon Strategies January 2019 | Tinuiti
Amazon Strategies January 2019 | TinuitiAmazon Strategies January 2019 | Tinuiti
Amazon Strategies January 2019 | TinuitiDigiday
 
Amazon Strategies January 2019 | Belkin
Amazon Strategies January 2019 | BelkinAmazon Strategies January 2019 | Belkin
Amazon Strategies January 2019 | BelkinDigiday
 
Amazon Strategies January 2019 | Stella Rising
Amazon Strategies January 2019 | Stella RisingAmazon Strategies January 2019 | Stella Rising
Amazon Strategies January 2019 | Stella RisingDigiday
 
Amazon Strategies January 2019 | Moroccanoil
Amazon Strategies January 2019 | MoroccanoilAmazon Strategies January 2019 | Moroccanoil
Amazon Strategies January 2019 | MoroccanoilDigiday
 
Digiday Brand Summit December 2019 | NASCAR
Digiday Brand Summit December 2019 | NASCARDigiday Brand Summit December 2019 | NASCAR
Digiday Brand Summit December 2019 | NASCARDigiday
 
Digiday Brand Summit December 2019 | Recess
Digiday Brand Summit December 2019 | RecessDigiday Brand Summit December 2019 | Recess
Digiday Brand Summit December 2019 | RecessDigiday
 
Digiday Brand Summit December 2019 | LipLove
Digiday Brand Summit December 2019 | LipLoveDigiday Brand Summit December 2019 | LipLove
Digiday Brand Summit December 2019 | LipLoveDigiday
 

Plus de Digiday (20)

Amazon Strategies January 2019 | Sellwin
Amazon Strategies January 2019 | SellwinAmazon Strategies January 2019 | Sellwin
Amazon Strategies January 2019 | Sellwin
 
Amazon Strategies January 2019 | OneSpace
Amazon Strategies January 2019 | OneSpaceAmazon Strategies January 2019 | OneSpace
Amazon Strategies January 2019 | OneSpace
 
Amazon Strategies January 2019 | Tatari
Amazon Strategies January 2019 | TatariAmazon Strategies January 2019 | Tatari
Amazon Strategies January 2019 | Tatari
 
Amazon Strategies January 2019 | 23andme
Amazon Strategies January 2019 | 23andmeAmazon Strategies January 2019 | 23andme
Amazon Strategies January 2019 | 23andme
 
Amazon Strategies January 2019 | Booyah
Amazon Strategies January 2019 | BooyahAmazon Strategies January 2019 | Booyah
Amazon Strategies January 2019 | Booyah
 
Amazon Strategies January 2019 | Publicis
Amazon Strategies January 2019 | PublicisAmazon Strategies January 2019 | Publicis
Amazon Strategies January 2019 | Publicis
 
Amazon Strategies January 2019 | Perpetua
Amazon Strategies January 2019 | PerpetuaAmazon Strategies January 2019 | Perpetua
Amazon Strategies January 2019 | Perpetua
 
Amazon Strategies January 2019 | Podean
Amazon Strategies January 2019 | PodeanAmazon Strategies January 2019 | Podean
Amazon Strategies January 2019 | Podean
 
Amazon Strategies January 2019 | eos
Amazon Strategies January 2019 | eosAmazon Strategies January 2019 | eos
Amazon Strategies January 2019 | eos
 
Amazon Strategies January 2019 | iCrossing
Amazon Strategies January 2019 | iCrossingAmazon Strategies January 2019 | iCrossing
Amazon Strategies January 2019 | iCrossing
 
Amazon Strategies January 2019 | Dash Hudson
Amazon Strategies January 2019 | Dash HudsonAmazon Strategies January 2019 | Dash Hudson
Amazon Strategies January 2019 | Dash Hudson
 
Amazon Strategies January 2019 | Direct Agents & Carhartt
Amazon Strategies January 2019 | Direct Agents & CarharttAmazon Strategies January 2019 | Direct Agents & Carhartt
Amazon Strategies January 2019 | Direct Agents & Carhartt
 
Amazon Strategies January 2019 | WellPath
Amazon Strategies January 2019 | WellPathAmazon Strategies January 2019 | WellPath
Amazon Strategies January 2019 | WellPath
 
Amazon Strategies January 2019 | Tinuiti
Amazon Strategies January 2019 | TinuitiAmazon Strategies January 2019 | Tinuiti
Amazon Strategies January 2019 | Tinuiti
 
Amazon Strategies January 2019 | Belkin
Amazon Strategies January 2019 | BelkinAmazon Strategies January 2019 | Belkin
Amazon Strategies January 2019 | Belkin
 
Amazon Strategies January 2019 | Stella Rising
Amazon Strategies January 2019 | Stella RisingAmazon Strategies January 2019 | Stella Rising
Amazon Strategies January 2019 | Stella Rising
 
Amazon Strategies January 2019 | Moroccanoil
Amazon Strategies January 2019 | MoroccanoilAmazon Strategies January 2019 | Moroccanoil
Amazon Strategies January 2019 | Moroccanoil
 
Digiday Brand Summit December 2019 | NASCAR
Digiday Brand Summit December 2019 | NASCARDigiday Brand Summit December 2019 | NASCAR
Digiday Brand Summit December 2019 | NASCAR
 
Digiday Brand Summit December 2019 | Recess
Digiday Brand Summit December 2019 | RecessDigiday Brand Summit December 2019 | Recess
Digiday Brand Summit December 2019 | Recess
 
Digiday Brand Summit December 2019 | LipLove
Digiday Brand Summit December 2019 | LipLoveDigiday Brand Summit December 2019 | LipLove
Digiday Brand Summit December 2019 | LipLove
 

Dernier

McDonald's: A Journey Through Time (PPT)
McDonald's: A Journey Through Time (PPT)McDonald's: A Journey Through Time (PPT)
McDonald's: A Journey Through Time (PPT)DEVARAJV16
 
marketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfmarketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfarsathsahil
 
Influencer Marketing Power point presentation
Influencer Marketing  Power point presentationInfluencer Marketing  Power point presentation
Influencer Marketing Power point presentationdgtivemarketingagenc
 
How To Utilize Calculated Properties in your HubSpot Setup
How To Utilize Calculated Properties in your HubSpot SetupHow To Utilize Calculated Properties in your HubSpot Setup
How To Utilize Calculated Properties in your HubSpot Setupssuser4571da
 
Mastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven WorldMastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven WorldScalenut
 
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdfMost Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdfCIO Business World
 
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdfDGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdfDemandbase
 
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdf
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdfDIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdf
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdfmayanksharma0441
 
Exploring The World Of Adult Ad Networks.pdf
Exploring The World Of Adult Ad Networks.pdfExploring The World Of Adult Ad Networks.pdf
Exploring The World Of Adult Ad Networks.pdfadult marketing
 
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfSnapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfEastern Online-iSURVEY
 
Master the Art of Digital Recruitment in Asia.pdf
Master the Art of Digital Recruitment in Asia.pdfMaster the Art of Digital Recruitment in Asia.pdf
Master the Art of Digital Recruitment in Asia.pdfHigher Education Marketing
 
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCR
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCRCall Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCR
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCRlizamodels9
 
The power of SEO-driven market intelligence
The power of SEO-driven market intelligenceThe power of SEO-driven market intelligence
The power of SEO-driven market intelligenceHinde Lamrani
 
Most Impressive Construction Leaders in Tech, Making Waves in the Industry, 2...
Most Impressive Construction Leaders in Tech, Making Waves in the Industry, 2...Most Impressive Construction Leaders in Tech, Making Waves in the Industry, 2...
Most Impressive Construction Leaders in Tech, Making Waves in the Industry, 2...CIO Business World
 
2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)Jomer Gregorio
 
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...CIO Business World
 
The Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO CopywritingThe Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO CopywritingJuan Pineda
 
Talent Management for mba 3rd sem useful
Talent Management for mba 3rd sem usefulTalent Management for mba 3rd sem useful
Talent Management for mba 3rd sem usefulAtifaArbar
 
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
ASO Process: What is App Store Optimization
ASO Process: What is App Store OptimizationASO Process: What is App Store Optimization
ASO Process: What is App Store OptimizationAli Raza
 

Dernier (20)

McDonald's: A Journey Through Time (PPT)
McDonald's: A Journey Through Time (PPT)McDonald's: A Journey Through Time (PPT)
McDonald's: A Journey Through Time (PPT)
 
marketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfmarketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdf
 
Influencer Marketing Power point presentation
Influencer Marketing  Power point presentationInfluencer Marketing  Power point presentation
Influencer Marketing Power point presentation
 
How To Utilize Calculated Properties in your HubSpot Setup
How To Utilize Calculated Properties in your HubSpot SetupHow To Utilize Calculated Properties in your HubSpot Setup
How To Utilize Calculated Properties in your HubSpot Setup
 
Mastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven WorldMastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven World
 
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdfMost Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
 
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdfDGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
 
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdf
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdfDIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdf
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdf
 
Exploring The World Of Adult Ad Networks.pdf
Exploring The World Of Adult Ad Networks.pdfExploring The World Of Adult Ad Networks.pdf
Exploring The World Of Adult Ad Networks.pdf
 
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfSnapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
 
Master the Art of Digital Recruitment in Asia.pdf
Master the Art of Digital Recruitment in Asia.pdfMaster the Art of Digital Recruitment in Asia.pdf
Master the Art of Digital Recruitment in Asia.pdf
 
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCR
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCRCall Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCR
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCR
 
The power of SEO-driven market intelligence
The power of SEO-driven market intelligenceThe power of SEO-driven market intelligence
The power of SEO-driven market intelligence
 
Most Impressive Construction Leaders in Tech, Making Waves in the Industry, 2...
Most Impressive Construction Leaders in Tech, Making Waves in the Industry, 2...Most Impressive Construction Leaders in Tech, Making Waves in the Industry, 2...
Most Impressive Construction Leaders in Tech, Making Waves in the Industry, 2...
 
2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)
 
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...
 
The Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO CopywritingThe Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO Copywriting
 
Talent Management for mba 3rd sem useful
Talent Management for mba 3rd sem usefulTalent Management for mba 3rd sem useful
Talent Management for mba 3rd sem useful
 
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
 
ASO Process: What is App Store Optimization
ASO Process: What is App Store OptimizationASO Process: What is App Store Optimization
ASO Process: What is App Store Optimization
 

Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15

  • 1. Know Your Malware Protect Yourself Amnon Siev CEO, Geoedge GEOEDGE CONFIDENTIAL 1
  • 2. GEOEDGE CONFIDENTIAL 2 Online Ad Verification Mobile Ad Verification Video Ad Verification GeoEdge is the leading Ad Verification provider for the Mobile and Online advertising ecosystem Our Mission: To ensure a Safe, Clean and Engaging User Experience New Offer!
  • 3. Customers • Over 700 customers worldwide • Partnering with leading Ad Platforms 3GEOEDGE CONFIDENTIAL
  • 4. The Real Cost of Malware GEOEDGE CONFIDENTIAL 4 Direct CostsPoor User Experience Long Term Impact Cost to Publisher
  • 5. Impact on User 5 Two levels: 1.User is warned 2.User is infected GEOEDGE CONFIDENTIAL Ransom Viruses
  • 6. Bad User Experience Without Malware 6 An holistic view of the user’s experience GEOEDGE CONFIDENTIAL Auto- redirects Drive By File downloads Post click File Downloads Java script errors Phishing scams Deceptive offers
  • 7. Mobile Redirect GEOEDGE CONFIDENTIAL 7 1 Use App See Banner2 Automatically Leaves App…and a new window is opened! 3
  • 8. Direct Costs 8 GEOEDGE CONFIDENTIAL Operational challenge to track & block campaigns Brand Reputation & Bad Publicity 1 2 Demand Partner blocked Legal exposure 3 4
  • 9. Long Term Impact On Your Business Ad injections - hijack your traffic cutting right into your bottom line Domain spoofing - your name is used to sell fake traffic - you can be black listed Often users are not aware they have been infected 9
  • 10. Long Term Impact On Your Ecosystem 10 Botnet for traffic and click fraud - malware that allows the hackers to create “real” traffic/clicks from the user machine This may happening on your site! “Traffic fraud is only a problem for advertiser …”
  • 11. ANA Report – December 2014 11 Advertisers lose faith in Premium publisher traffic! 1. CPM goes down as Advertisers factor into account fake traffic (23% of video ads traffic is not human) 2. Complicate contracts with advertisers BIG PICTURE
  • 12. 12 I’m not at risk… Common misconceptions GEOEDGE CONFIDENTIAL
  • 13. Misconception #1: Manual pre-lunch checks Hacker buys ad space on your site Campaign is launched User accesses your site From: France Browser: IE Time: 2 PM Infected: No User accesses your site From: Canada Browser: Chrome Time: 1 AM Infected: Yes Hacker injects malicious code targeting a specific user segment Malware attacks are dynamic and usually starts after the campaign go live. Manual check is meaningless as malware will probably target specific user segment Malware!
  • 14. Misconception #2: Ad server protection 14 I’m protected because I’m using my ad server malware detection GEOEDGE CONFIDENTIAL
  • 15. MALWARE Ad server protection limitation 15 3rd Party Ad servers Tag ` Tag Tag Tag Publishers Ad Server
  • 16. Nuclear Exploit Kit landing page Ad server protection limitation - example GEOEDGE CONFIDENTIAL 16 September 2014: Last.fm & Jerusalem Post attack via Double Click that called Zedo Pubads.g.doubleclick.net d3.zedo.com/jsc/d3/fo.js (compromised) Static.the-button.com/d2.php [string].wiab-service.se/geobalance/geo2.php
  • 17. Misconception #3: Direct Campaigns 17 I’m protected because I’m serving campaigns directly from my in house platform GEOEDGE CONFIDENTIAL  Landing page – post click attacks are more common than pre click!  You are exposed via other 3rd party code on your site  Your infrastructure could be hacked
  • 18. Misconception #4: Trusted Demand Partners 18 I’m protected because I trust my demand-partners protection GEOEDGE CONFIDENTIAL  Demand-partner’s protection is limited  Protection systems are based on scans – your traffic is a small portion of their traffic and scanned accordingly.  Many malware attacks come through reputable demand partners and SSPs: Jan 2015 – AOL: Drive-by malware downloads to the Huffington Post, GameZone, LA Weekly,
  • 19. So What Can Be Done? 19 1. Use proactive protection 2. Understand the implications for users. It’s not enough just to know that there was an attack 3. Find the infected campaign – HOW? 4. Track the bad player – of all the mediators who could be responsible 5. Block Campaign GEOEDGE CONFIDENTIAL  Holistic view of the user’s experience  Full transparency  Detection AND recommendation  Pinpoint malicious source  Multi-format protection  New VIDEO verification
  • 20. Super exciting NEWs from GeoEdge 20 First ad verification service that will provide TRUE transparency and verification for Video Ads! Video Malware Protection Protect against bad user experience • Auto play with/out sound • Ad length / size Protect Publisher Video Revenues • Identify player inside banner GEOEDGE CONFIDENTIAL
  • 21. 21 w w w. geoedge. com GEOEDGE CONFIDENTIAL