July 24, 2015 By Douglas Bonderud 2 min read

To empower their brand, companies must spend on advertising. As print effectiveness continues to fall, businesses are compelled to seek out online alternatives — and tech giants like Google, Facebook and Yahoo are happy to oblige. According to Fortune, however, there’s a problem: While Internet bots account for more than half of all ad views, they’re nonetheless counted as impressions, and the views are billed to unsuspecting companies.

Now, the Trustworthy Accountability Group (TAG) has joined forced with these technology heavyweights to create a bot blacklist that should help clean up online advertising.

Why the Blacklist?

With a host of metrics to choose from, shouldn’t marketers and companies be able to pinpoint which ads make the biggest impact and which are ignored by online consumers? Part of the problem is choice: Are clicks or page views more telling about ad impact? Is time spent on a page more telling than unique monthly visitors?

There’s also another, more serious issue: As noted by Fortune, “a massive chunk of the advertising market is based on smoke and mirrors, or even outright fraud.” This can happen as a result of pixel stuffing, where ads are crammed in small spaces, or ad stacking, where multiple ads are shown layered one on top of the other. Some companies employ humans to click on ads and record impressions, while many others leverage the much faster route of using bots programmed to scroll and click through sites just like typical consumers.

The result? Companies have no idea if the ads they’re paying so much for are actually getting noticed and driving sales or if they’re victims of a bait and switch.

Robot Revolution

According to Threatpost, TAG has a possible solution: A blacklist of bad-IP data mined from Google, Facebook, Yahoo and other high-profile advertising platforms. While it’s not often that tech giants see eye to eye, they now have a common goal: If robot IP traffic dominates their data centers and drives down the value of ads, buyers will start looking elsewhere for human views.

With Google raking in over $50 billion in ad revenue, solving this problem is a high priority. With 8.9 percent of all clicks blacklisted under the new pilot program, there’s already a significant margin of error to correct. And with some 60 percent of all Internet traffic generated by robots and then sent through corporate data centers, there are other advantages to getting this problem under control: Fewer bots means better network performance.

Right now, tools like URL Spirit and HitLeap are generating millions of fake ad requests per day and raking in millions for malicious actors. Companies are largely held hostage by the need for digital advertising; without online campaigns and targeted ad placement, they risk falling behind the competition. But the market at large is being duped by robo-clickers and bot-scrollers designed to mimic human behavior and clog up data centers. Ideally, a TAG blacklist powered by IP data from some of the world’s foremost tech companies should help block the bad guys and bring down the bots.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today