3 Treacherous Traps

3 Treacherous Traps
featured image

Don’t get lured in by these deceptions! Learn three major techniques malvertisers use to hide their misdeeds.

Malvertisers have an extensive tool set for evading malware scanners and blockers. Watch these three quick videos to learn more about the most popular methods of obfuscation—and how to protect your users from literal veiled threats.

Cloaking

The ol’ switcheroo—scammers use devious code to make their creative appear innocuous to pass platform audits, then release the nasty business on publisher properties. However, there are ways to suss out this technique, as Digital Security and Operations Director Pat Ciavolella explains in the video below.

Compromised Landing Pages

Another sneaky move to hide malicious intent, compromised landing pages were on a steep incline in 2020. Even more worrisome, the actual page owner might have had their site hijacked may not know they are spreading malware, warns Cory Schnurr, Head of Marketplace Innovation.

Fingerprinting

Most people in digital advertising associate fingerprinting with uncouth audience data collection for profiling, but malvertisers use the tool to ensure they hit their target environments.

Watch the full webinar to learn more about how malvertisers have greatly shifted tactics—and how you can stay in step.