Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:30 PM
Dark Reading
Dark Reading
Products and Releases

Mobile Bot Traffic On Pace To Waste Nearly A Billion Dollars Of Advertising Budgets In 2013

Solve Media's latest Bot Traffic Market Advisory update reveals increase in bot traffic during the first quarter of 2013

NEW YORK – April 25, 2013 – Solve Media (www.SolveMedia.com) issued its latest Bot Traffic Market Advisory update today, revealing an increase in bot traffic during the first quarter of 2013. The company identified that suspicious activity remained above 40% in Q4 2012 and Q1 2013. Further analysis showed that 29% of the suspicious activity in Q1 was the result of bot traffic, up from 25% in Q4.

Mobile bot traffic is also on the rise. Solve Media's authoritative anti-bot security platform revealed that 29% of mobile traffic acted suspiciously in Q1 2013, 14% of which was confirmed as bots.

Not all of the traffic identified as mobile is in fact from a mobile device. Malicious hackers are increasingly writing code to masquerade as mobile users in order to take advantage of the lower security levels imposed on mobile users. Regardless of the true origin of the user, mobile bot traffic is an increasing concern for the advertising community. At the current level of mobile bot traffic, the industry is on pace to waste close to a billion dollars in ad spend in 2013.

"The barrier to entry for fraud and bots in mobile is almost nonexistent," said Justin Somaini, Chief Trust Officer at Box, and the newest member of Solve Media's Security Advisory Council. "The mobile bot levels reported by Solve Media should serve as a wake up call to both publishers and advertisers. Marketers will continue to demand a human audience."

A geographic analysis revealed that Singapore and the United Arab Emirates have the highest levels of suspicious mobile traffic, at 71% and 67% respectively. In the US, suspicious web activity in Q1 reached 44%, and suspicious mobile activity reached 19%.

"With the increase in mobile advertising spending this year, it has become incredibly important for advertisers and agencies to be aware of the inefficiencies associated with serving mobile ads to bots," said Ari Jacoby, CEO of Solve Media. "It is up to publishers to implement anti-bot solutions and up to advertisers to seek out partners that take a real stance against bot traffic."

Solve Media runs advertisers' campaigns on its network, consisting of more than 6,000 publishers, and uses its proprietary TYPE-IN&trade technology to prevent bot traffic, improve user experience, and guarantee human engagement. Solve Media's anti-bot security platform specifically addresses bot traffic affecting publishers, ad agencies and advertisers by authenticating that audiences are, in fact, human. Solve Media is the market leader in the space, and has been monitoring and deterring bot traffic for more than three years.

Bots crowd web and mobile traffic and cause advertisers to pay for impressions and clicks that are not being engaged with by people. Malicious bots undermine the security of the web and cause harm, including stealing publisher content, creating spam assets and phishing.

About Solve Media

Solve Media (www.SolveMedia.com) was founded by veteran entrepreneurs and technologists focused on innovative Internet advertising and security solutions. The company's proprietary online advertising platform, the TYPE-IN&trade, was designed to create highly effective opportunities for brands to engage online. With the platform, Solve Media guarantees brand message delivery, brand lift and return on investment for advertisers. Additionally, the platform creates new revenue opportunities for publishers, and saves time for consumers. Backed by First Round Capital, New Atlantic Ventures, AOL Ventures, Bullpen Capital and prominent angel investors, Solve Media is based in New York City and Philadelphia.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-13
Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable denial of service via local access.
PUBLISHED: 2020-08-13
Uninitialized pointer in BIOS firmware for Intel(R) Server Board Families S2600CW, S2600KP, S2600TP, and S2600WT may allow a privileged user to potentially enable escalation of privilege via local access.
PUBLISHED: 2020-08-13
Improper initialization in BIOS firmware for Intel(R) Server Board Families S2600ST, S2600BP and S2600WF may allow a privileged user to potentially enable escalation of privilege via local access.
PUBLISHED: 2020-08-13
Unprotected Storage of Credentials vulnerability in McAfee Data Loss Prevention (DLP) for Mac prior to 11.5.2 allows local users to gain access to the RiskDB username and password via unprotected log files containing plain text credentials.
PUBLISHED: 2020-08-13
Out-of-bounds write in Kernel Mode Driver for some Intel(R) Graphics Drivers before version may allow an authenticated user to potentially enable denial of service via local access.