Comments
Bot-Driven Online Ad Fraud Losses Decline
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
9/7/2017 | 1:15:45 PM
IBM and Watson
If I read one more post anywhere about how Watson can save every single problem in the western world through AI knoelege ..... while Lady Ginny at IBM is gutting cloud and Watson staff like crazy???    Can Watcon improve IBM revenue gone bad for 21 quarters???  AI may be great but it is NOT a total solution until itself.  Anybody remember what WOPR was and damn near did?
Eduardo.Master
50%
50%
Eduardo.Master,
User Rank: Apprentice
9/7/2017 | 12:05:29 PM
Re: Ad fraud is a big problem
Can Machine Learning Help Organizations Improve Data Security?
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
5/31/2017 | 9:39:26 AM
Re: Ad fraud is a big problem
Given that losses are still in the billions of dollars, indeed it is still a huge problem. Cleaning up the pollution in the ad ecosystem entails the cooperation of all players, and continuing to make it too expensive for the bad guys to target this space.
floydophone
50%
50%
floydophone,
User Rank: Author
5/30/2017 | 11:28:40 PM
Ad fraud is a big problem
Even though it seems to be declining, ad fraud is still a big problem. There's a lot of great coverage on the Software Engineeering Daily podcast about ad fraud and various mitigation techniques. At the end of the day, I think CPA mitigates a lot of the problem but it'll be a long time until we're fully there.


Facebook Aims to Make Security More Social
Kelly Sheridan, Associate Editor, Dark Reading,  2/20/2018
SEC: Companies Must Disclose More Info on Cybersecurity Attacks & Risks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  2/22/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.