FAQ

Getting started

AdSecure is an automated ad verification system built around a custom-made crawler capable of simulating a wide array of devices and geo's. It allows you to automatically scan ad tags and landing pages for non-compliance and malware in real-time.

As soon as our system detect a threat in a project, an alert notification is sent to the advertising operation team, giving access to a comprehensive report listing all malicious links, allowing them to take appropriate actions.

AdSecure is primarily for Ad Platforms, Ad operations team and Publishers

For Ad Platforms – by ensuring a continuous compliant and malware-free ad delivery.

For Ad operations teams – by allowing to take actions in real-time on unauthorized ads thanks to forensic evidence.

For Publishers – by protecting their brands and sustaining a secure and safe user experience for their visitors.

Ready to get started with AdSecure?

Create an account now on the AdSecure website:

  1. Open a new tab in your web browser.
  2. Go to https://www.adsecure.com and click on the Free Trial button, or go directly to https://www.adsecure.com/free-trial/.
  3. Fill in the form 
  4. Then click on "Request Free Trial".
  5. One of our account manager will contact you to finalize your registration.

Basic usage

A scan is the analysis of 1 creative (url, script, smart link…), from 1 device and from 1 geo-location.

A violation corresponds to a type of detection, which can be either non-compliant or malicious. Refer to the section Detection in our FAQ to consult the complete list of violations AdSecure supports.

If you need to share a digital evidence of the violation(s) detected during the scan of a creative, you have the possibility to share the public version of a report with the third party of your choice.

Simply click on the "share" icon (  ) located at the top right-hand corner of any given report before sharing it with the third party of your choice.

Detection

Adware:
Adware is a software that downloads or displays unwanted ads when a user is online, collects marketing data and other information without the user's knowledge, or redirects search requests to certain advertising websites.

Auto-download:
Ads that automatically download a file/executable/application without user interaction.

Auto-redirect:
Ad that contains a script causing a web page to break out of any frames "framing" it, resulting in redirecting the visitor to another website/page

Auto-redirect app store:
Ads that is automatically redirecting to the App Stores without user interaction.

Auto-vibrate:
Ads that automatically vibrate the user's device when reaching a landing page. Malicious use of the HTML5 vibrate API.

Back Button Hijack:
Ads containing a script that allows an advertiser to manipulate the browser history. Usually it consists in inserting one or several pages in the browser history, which would prevent the user to go back to the previous page he was coming from.

Blacklisted URL:
Blacklisted domains or IPs are resources which are blocked by blacklisting authorities (e.g. search engines, antivirus providers, security organizations) from distributing malicious content online such as phishing attacks, malware, unwanted software, web spam and social engineering. (Note: AdSecure stores positive matches for a period of 72h – e.g. if a resource is cleared from a blacklist, it will also be removed from our blacklist after a maximum of 72h)

Browser Locker:
The script runs in the web browser and its main purpose is to disable any form of action that can close the browser – such as clicking the close button and pressing certain shortcut keys. All attempts to close the browser will result in a warning message box (Javascript alerts)

Drive-by mining:
Ads that consists in using a piece of javascript code to mine different cryptocurrencies directly through the visitor's browser.

JS Alert on exit:
Javascript alert that pops up when the user wants to close the active tab.

JS Alert on entry:
Javascript alert that pops up without user interaction when entering on a website.

Landing page error:
You would receive an alert when the system identifies a broken/dead link (404 Error, 5xx, timeouts, etc.) in the landing page or when a broken link is identified in the path (intermediate redirect links inside the daisy chain) between the click URL and the landing page.

Malicious URL:
Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure unsuspecting users to become victims of scams (monetary loss, theft of private information, and malware installation)

Malware:
Malware is a general category of malicious code that includes viruses, worms and Trojan horse programs. It is used to disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising

Phishing URL:
A phishing site might trick users into revealing their personal information (for example, passwords, phone numbers, or credit cards). The content pretends to act, or looks and feels, like a trusted entity — for example, a browser, operating system, bank, or government.

Potentially Unwanted Programs (PUP):
Unwanted software is an executable file or mobile application that engages in behavior that is deceptive, unexpected, or that negatively affects the user's browsing or computing experience.

Ransomware:
Ransomware is a form of malware that essentially holds a computer system captive while demanding a ransom. The malware restricts user access to the computer either by encrypting files on the hard drive or locking down the system and displaying messages.

Scareware:
Ads claiming that you have a virus and you are in need of anti-virus software may, ironically, actually contain a virus that could harm your computer, cause costly repairs or, even worse, lead to identity theft. Scammers often use the names of well-known companies that specialise in computer software to gain your trust. The pop-up advertisements aim to mimic genuine warning alerts generated by computer security software.

SSL non-compliant:
Ad that contains at least one unsecured item in the chain of resources (unsafe, no https, mixed content, ssl version or cipher mismatch)

Suspicious TLD:
Top-level domains frequently used by cybercriminals who are setting up hosts for spam e-mailing, scams, shady software downloads, malware distribution, botnet operations and "phishing" attacks, or other suspicious content. Please note that it may not be necessary to block all domains flagged as suspicious, but it is our policy at AdSecure to inform you of their potential relationship to malicious activity so that you can make an informed decision.

Uncommon protocols:
When two computers are connected and exchange information, the computers use common communication protocols such as TCP/IP, DHCP, DNS, and HTTP. In some cases, communication may involve an uncommon protocol. Uncommon protocols can be used to activate undesirable actions which impacts the user experience. Here are a few examples of uncommon protocols that will be flagged by AdSecure: "tel:", "whatsapp:", "mailto:", "intent:", "sms:"  

Miscellaneous

Less than you think! Just drop us a quick message with your needs, and we will send you a non-binding offer.