Ad Tech Security

Ad Tech Security

Try our free test and find out if your site is at risk.

SELF- SERVE PACKAGES

CHECK UP

One-time Scan
$40 /Per Scan
  • 1 Scan 2500 pages
  • Score and list of all tags
  • View divs and urls tags appear on
  • Access to Forensic Tag Map
BUY

LITE

1 Scan Per Mo.
$29 /Mo.
  • 1 scan per month
  • Score and list of all tags
  • View divs and urls tags appear on site
  • Access to Forensic Tag Map
BUY

WEEKLY

1 Scan Per Week
$80 /Month
  • 1 Security Scan Weekly
  • Global Forensic Tag Map
  • Access to Help Desk
  • Score and list of all tags
  • View divs and urls tags appear on site
  • DEV/CON premium networks
BUY

DAILY

1 Scan Per Day - 2 sites
$400 /Mo.
  • 1 Security Scan Daily
  • Global Forensic Tag Map
  • Access to Help Support Team
  • Access to Clean Team
  • Score and list of all tags
  • View divs and urls tags appear on site
  • DEV/CON premium networks
BUY
N

Code Monitoring

N

Revenue Security

N

Yield Optimization

N

Training

Audit-Lite

DEV/CON Detects Internal & External Revenue Threats

Premium and programmatic advertising from trading desks and exchanges are the life blood of digital media and agencies. But what happens when reporting doesn’t reconcile with revenue? What are business leaders supposed do when their Adsense income isn’t matching up with impressions? Or when their reporting questions are left unanswered? That’s where Dev/Con comes in. Dev/Con’s comprehensive audit services and SaaS identify the source of revenue declines and leakage, saving its customers millions of dollars each year.

PornHub Malvertising Attack Exposed Millions to Ad Fraud

KovCoreG group, well-known for spreading Kovter malware globally via such tactics, tweaked its operations to include advanced filtering and social engineering rather than exploit kits, believing this to be a more certain way of infecting users.
Read More

Whole Foods hit by hackers in latest cybersecurity breach

Amazon.com's Whole Foods Market on Thursday said payment card information has been stolen from taprooms, restaurants and other venues located within some of its stores. The upscale grocer, which Amazon recently purchased for $13.7 billion, said it uses a different point-of-sale system for its roughly 450 U.S. stores. That system was not involved in the data hack, the company said.
Read More

Hijacked Chrome Extension Forced Ads On Over 30,000 Users

You may not have heard of online ad fraud and clickjacking, but they're very widespread problems. It's difficult to know exactly how widespread, too, because they often go unreported. People that aren't so technologically inclined may simply think the increased number of ads they're seeing -- or a sudden change in their content -- isn't anything out of the ordinary. They've become accustomed to auto playing video ads, pop-ups, and full-page overlays on websites, after all.
Read More

Hackers Hit Dozens of Countries With a Stolen N.S.A. Tool

LONDON — Hackers using a tool stolen from the United States government conducted extensive cyberattacks on Friday that hit dozens of countries around the world, severely disrupting Britain’s public health system and wreaking havoc on computers elsewhere, including Russia.
Read More

One in 20 web users infected with ad injection software

More than one in 20 web users are infected with ad injectors, a type of malware that puts unwanted adverts on web pages, according to new research from Google. As a result, the company has announced a new crackdown on the software, which can manifest either as a...
Read More

A flaw in the Cisco WebEx Extension allows Remote Code Execution

Tavis Ormandy, a security expert at Google Project Zero, has discovered a critical remote code execution vulnerability in the Cisco WebEx browser extension. Publicly known “magic string” lets any site run malicious code, no questions asked. The popular Google Project...
Read More

Marketers thought the Web would allow perfectly targeted ads. Hasn’t worked out that way.

Ron Amram has been in the brand marketing business for about 20 years. In the 2000s he was media director for Sprint’s prepaid cellular group, mainly figuring out where the carrier should spend its ad dollars—print, outdoor, digital, or broadcast. TV was always at the top of the pyramid. A TV campaign was like “the Air Force,” Amram says. “You wanted to get your message out, you did carpet bombing.” But TV wasn’t cheap, nor did it solve “that age-old question: Half of my marketing is working, half of it is not, and I don’t know which half.”
Read More

Here Are 4 Common Methods That Ad Fraudsters Use to Make Their Ill-Gotten Money Where crime continues to pay

Ad Fraud: Here Are 4 Common Methods That Ad Fraudsters Use to Make Their Ill-Gotten Money Where crime continues to pay
Read More

Latest news: Digital advertising revenue threats are real

Marketers Bringing Programmatic In-House for Greater Transparency December 29, 2016 – MediaPost’s RT Daily blog says Brands are now auditing their agencies to ensure they’re getting a fair deal, when outsourcing programmatic buying. Agencies, brands and publishers are...
Read More

Latest news: Cyber firm says Russian ‘Methbot’ scam is defrauding digital advertisers

December 19, 2016 -- White Ops cybersecurity firm is saying that the “Methbot” has generated about 300M fake views a day, according to CNN. If you’re thinking that’s $1.5M a day or $45M a month -- assuming a $5 CPM -- you’re correct! It seems the Russian-based...
Read More

%

Revenue Increase

Recent Case Studies

One mid-size publisher with average site traffic of 3.5m UV, 15m pageviews, 50m + impressions monthly was only generating $800 in monthly revenue for its most popular ad network for all units.  After DEV/CON detected and removed exploits from just one leaderboard for that ad network, revenue increased from $800 per  mo. total to $3,000 per mo. for one leaderboard – a  275% revenue increase.

See More

Fully integrated with most major ad servers, ad networks and CMS platforms

DETECT & PROTECT against internal and external threats to your revenue

Our team of digital advertising professionals, white-hat hackers, and data scientists leverage out patent-protected technology to:  detect, fix, and monitor both technical and organizational vulnerabilities to protect and increase agency and publisher revenue.

Meet the Board