The display advertising process has been pretty consistent over recent years. Advertisers like Coca-Cola, AT&T, and State Farm Group plan and buy available advertising space on publisher websites. The planning and buying is conducted by someone in-house or an outside advertising agency or independent marketer is brought in to facilitate. The use of an advertising platform usually follows and serves to disperse the actual ad units across various web properties for people to consume. People then have the choice to view and click-through on an ad depending on how enticing the offer or messaging is. What happens if an ad unit is not served and people don’t have the opportunity of reacting to it because it simply did not appear? That’s precisely what comScore revealed in their U.S. Digital Future in Focus 2013 report.
Web spam is the bombardment of mostly unsolicited advertising messages or links sent across a wide array of media, including social networking websites, instant messaging applications, online newsgroups or forums, mobile phones, and blogs. Web spam has even been found stuffed within the results pages of popular search engines like Google. While the majority of web spam is benign, certain campaigns are tied to particular types of web pages disguised to contain valuable information. In actuality, these spam web pages are often littered with irrelevant and meaningless content, sometimes inappropriate in nature, or worse yet they can be used to host and spread malware.
Here are some simple web safety tips, warnings and general practical knowledge intended for the common Internet user.
News that the European Internet authority RIPE is down to its last block of IPv4 addresses escalates the importance of supporting IPv6. Within a few years, IPv4 addresses will become expensive or impossible to acquire for new businesses or for expanding service providers.
I received an email seemingly from PayPal informing me that access to my account has been limited. It threw me off because I received this at my work email, which is not registered with PayPal. I immediately wondered if my account got hacked.
zveloLABS® has reported statistics and trends about the most visited types of malicious URLs by the international end users of zvelo’s technology partners. These OEM Partners include well over 100 of the world’s leading service providers, UTM and gateway appliance vendors, web filtering and parental controls solutions software makers, online advertising and brand safety technology providers, web analytics firms and many more. The data sample was extracted from actual URLs queried to and contextually categorized by the zveloNET® cloud systems during Q3 of 2012, and numbered in the tens of millions, yet far from the billions of non-malicious queries seen daily. The findings, statistics and trends shed new light on the seriousness, frequency, and negative consequences of compromised (hacked) websites hosted worldwide, and more importantly, accentuates the importance of adequate web filtering and network security.
This is the second and final recap of the ROOTCON 2012 annual hacker conference and information security gathering, which zveloLABS had the opportunity of attending. Following are additional highlights that deserve to be shared instead of being tucked away in my personal notebook.
zveloLABS® recently had the opportunity to attend ROOTCON 2012, an annual hacker conference and information security gathering, that was held in Cebu City, Philippines. The organizer line-up was interesting and quite varied. Attendees came from government, private and academic sectors. Following is part one of two recaps about this insightful event.
Malware authors are quickly exploiting the vulnerabilities of IPv6 as more and more websites support the new communications protocol. Nefarious IPv6 tools exist that can be used for malicious online activity, even if the tools are intended to facilitate communication between the IPv6 and IPv4 protocols
zveloLABS detected a suspicious-looking email purporting to come from the Electronic Federal Tax Payment System (EFTPS) of the U.S. Treasury Department. This email is fraudulent and claims that “Your Federal Tax Payment ID has been rejected.” The payment rejection is falsely attributed to the use of an invalid identification number. Here is an example of the actual phishing email (see image 01), followed by some observations that should raise red flags about its validity.