• How to protect yourself against ad fraud

    … in being too strict with these targeting segments is that you constrain your potential pool of inventory. So if delivery is a top priority, you might run into scaling issues. In that case, you may need to relax your tolerance level. Step 2: Use an ad verification vendor Ad verification vendors provide campaign metrics for advertisers, including…

    Ratko Vidakovic/ Marketing Landin Display How To's- 13 readers -
  • Who Should Be Responsible For Stopping Programmatic Ad Fraud?

    … fraud-detection technology. This produces rich reporting on questionable traffic that we block (pre-bid) from future campaigns. Our team routinely reviews this data and blocks sources with excessive non-human traffic. There are other tools and processes we use, but I don’t want to disclose these for fear of tipping off fraudsters. Unfortunately…

    Ratko Vidakovic/ Marketing Landin Display- 28 readers -
  • Why Programmatic Advertising Fraud Exists

    In my last column, we covered what fraud is, the magnitude of the problem, and the many ways in which it takes shape. We are now going to discuss one of the biggest questions that arise around the topic of ad fraud: Why does it exist in the first place? As with most big problems, a combination of factors contributes to an environment that makes the problem possible and persistent.

    Ratko Vidakovic/ Marketing Land- 23 readers -
  • The Many Faces Of Programmatic Ad Fraud

    … agents, using random proxies (to rotate IP addresses), mimicking normal click-through rates, and in some cases, even mimicking real mouse movements from captured browser activity. All of these factors make it harder to fingerprint and block them. • Botnets: Botnets are generally a large array of personal (residential) computers that have been…

    Ratko Vidakovic/ Marketing Landin Display- 29 readers -
  • Facebook Tests Onion URL for Tor Users

    … some assumptions of Facebook’s security mechanisms — for example, its design means that from the perspective of our systems, a person who appears to be connecting from Australia at one moment may the next appear to be in Sweden or Canada. In other contexts, such behavior might suggest that a hacked account is being accessed through a “botnet…

    David Cohen/ AllFacebookin Social Facebook- 5 readers -
Get the top posts daily into your mailbox!
More from around the web