Cloud

12/11/2017
10:42 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Dev/Con Detect Launches Ad Tech Industry Fraud Detection, Prevention

Startup lands $1.29mm in seed round funding.

MEMPHIS, TN, December 11, 2017 —Cybersecurity company DEV/CON DETECT today announced the official launch of their proprietary, patent-protected software designed to eliminate online advertising fraud. DEV/CON DETECT’s innovative and unprecedented subscription-based technology detects, repairs, and monitors technical and organizational vulnerabilities to protect and recover revenue for all ad-supported digital media entities. Losses from fraud are expected to total as much as 10 percent of the $80 billion-plus digital advertising expenditures projected* for 2017.

Recognizing that existing ad fraud companies like White Ops, Integral Ad Science (IAS) and Interactive Advertising Bureau (IAB) focused on click-fraud, ad quality issues, and verification initiatives like ads.txt which all work to create transparency for the ad buyers, industry insiders Maggie Louie and Josh Summitt undertook the challenge of creating transparency for the publisher-side revenue losses. Hijacked tags and the injection of malicious programs intended to divert digital ad revenue, criminally, is a growing new threat­ facing the online publishing and advertising industry.

DEV/CON DETECT addresses these vulnerabilities that directly impact premium network and programmatic advertising essential to revenue success for publishers, brands, media companies, ad networks and agencies.  This includes “clickjacking” and online ad fraud that is often unreported. DEV/CON DETECT provides a comprehensive threat detection, revenue protection SaaS platform, to identify and remediate sources of revenue loss.

“We are thrilled to leave stealth mode and establish DEV/CON DETECT as the leading security solution for publishers and ad tech platforms,” said Maggie Louie, DEV/CON DETECT founder and CEO. “Most cybersecurity companies working in media and advertising are focused on blocking bots and malware that only treat the symptoms. Our technology and indexing identifies the exact hijacked ad slots, ad-injections, and networks allowing ‘spammy,’ low-quality ads. Our team of digital advertising professionals, white-hat hackers, and data scientists has created a first-of-its-kind detection and remediation solution, and we’re gratified that the investment community is rallying to support our growth.”

With deep experience in Ad Tech, mobile product development, e-commerce, and revenue allocation technology with The E.W. Scripps Co., the Los Angeles Times and Morris Communications, Louie realized the extent of the problem first hand.  She unexpectedly uncovered methods that a publisher’s lead developer was able to exploit the company’s content management system (CMS), ad server and cache servers to embezzle nearly $1 million dollars. That discovery led to criminal charges being filed and a successful prosecution of the developer, which resulted in a percentage of revenue being recovered. This case established DEV/CON DETECT as an emerging technology company.

Co-founder and CTO Josh Summit, brings extensive IT and Cybersecurity expertise to the startup’s impressive founding line-up. He has been praised as “a very skilled security analyst and would be an asset to any organization that needs to mature its security program” by no less than computer security expert and former high-profile hacker Kevin Mitnick, who worked with Summitt for five years.

“Programmatic ad fraud is a prevalent problem in the industry,” said Henri Deshays, Partner, Newfund US. “Publishers are the most impacted yet there is no comprehensive solution that caters to them. We believe that DEV/CON is best positioned to protect publishers from an increasing number of cyber attacks. For the first time, publishers can rely not only on a complete database of known malware and exploits but also on unknown threats, thanks to DEV/CON's monitoring solution.”

The $1.29 million in seed round funding capital raised by Louie was led by Paris and San Francisco-based Newfund’s investment. Additional investors include Golden Seeds, Innova Memphis, Off The Grid Ventures, The JumpFund, GAN Ventures, Las Olas Venture Capital, Start Co., Hampus Jakobsson and Chad and Kelly Fowler. Funds will power a strong pipeline and extend market growth with a focus on advancing the existing DEV/CON platform and expanding sales teams. Innova Memphis partner Jan Bouten will join the DEV/CON board effective December 1, 2017. Further investor information and quotes can be found at https://www.devcondetect.com/about/.

 

About DEV/CON DETECT

Based in Memphis, privately-held DEV/CON DETECT is one of the first companies created to help media organizations detect and protect against internal and external security threats to advertising revenue streams. Founders Maggie Louie and Josh Summitt have established track records as successful leaders in the digital publishing and media industries, including IT, cybersecurity, mobile application development, mobile revenue security and development, e-commerce infrastructure, ad tech and product engagement for companies such as the E.W.Scripps Company, the Los Angeles Times, Morris Communications and Bank of America to name a few.

DEV/CON DETECT is one of the primary innovators addressing the growing need for ad tech security and revenue protection. The DEV/CON DETECT team of digital advertising professionals, white-hat hackers, and data scientists leverage patent-protected technology to detect, fix, and monitor both technical and organizational vulnerabilities to protect and increase agency and publisher revenue. DEV/CON DETECT’s ad tech security platform has a provisional patent acquired June 2017, full international utility patent pending. Registered Trademark - Ad Tech Security®

For more information on the company and its technology, go to: https://www.devcondetect.com/.  

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
You Break It, They Buy It: Economics, Motivations Behind Bug Bounty Hunting
Ericka Chickowski, Contributing Writer, Dark Reading,  1/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.