Feautured Resources

Glossary

Search Glossary

A

Ad Fraud

Ad fraud is the practice of viewing, clicking, converting, or generating false interactions with any web asset for the sole purpos...Read More

Ad Fraud

Ad fraud is the practice of viewing, clicking, converting, or generating false interactions with any web asset for the sole purpose of earning money directly or indirectly. These actions are solely profit-driven and have no ties to the actual content of the advertising. Fraud can involve bots, malware, humans, or a combination, depending on the end goals of the fraudsters. Download Ad Fraud 101 eBook

Ad Hiding

Ad hiding is a strategy that involves hiding ads in some way on a website. In this scenario, user traffic is legitimate, but the a...Read More

Ad Hiding

Ad hiding is a strategy that involves hiding ads in some way on a website. In this scenario, user traffic is legitimate, but the ads are never seen. There are a few techniques that fraudsters use to hide ads, including pixel stuffing and ad stacking. 

Ad Injection

Ad injection is a more nefarious pathway for fraud. This method uses malware to infect a website to override normal ad placement p...Read More

Ad Injection

Ad injection is a more nefarious pathway for fraud. This method uses malware to infect a website to override normal ad placement protocols. This opens a site up to unwanted advertising, which can be placed in spots that haven't been paid for or, worse, were purchased by legitimate advertisers. Most injected ads are irrelevant to the website in question or feature inappropriate content. Due to the malware required to achieve this strategy, ad injection poses a significant risk to the sites in use. This scam can affect companies of all sizes. 

Ad Stacking

Ad stacking is a way to hide ads on a page for the sake of maximizing the number of impressions while saving website real estate. ...Read More

Ad Stacking

Ad stacking is a way to hide ads on a page for the sake of maximizing the number of impressions while saving website real estate. Using this strategy, ads are stacked on top of one another so that only the top ad is visible. While all of the ads register impressions when users visit the website in question, the user will only see one ad per stack. All of the other ads included in a stack will fail to perform as they can't be seen by visitors to the site. This technique implies that a site provides a large number of impressions, even though traffic is largely worthless. 

Affiliate Marketing Fraud

Affiliate marketing is a marketing avenue in which businesses pay affiliates who can draw in new visitors or customers. Generally,...Read More

Affiliate Marketing Fraud

Affiliate marketing is a marketing avenue in which businesses pay affiliates who can draw in new visitors or customers. Generally, the affiliate receives some sort of kickback for every new action generated, which can be in the form of impressions, clicks, leads, or eCommerce purchases. Affiliate marketing fraud aims to cheat merchants, buyers, or legitimate affiliates through the use of misleading or fraudulent activities to earn illegitimate commissions. 

Auto-Refresh

When a website owner wants to increase the number of impressions they can sell, they can automatically refresh the page, part of t...Read More

Auto-Refresh

When a website owner wants to increase the number of impressions they can sell, they can automatically refresh the page, part of the page, or just the ad unit itself to generate more impressions while the visitor is spending time on the site. For example, if a visitor spent an average of three minutes on a site, and if just one ad unit was updated every 10 seconds, this would translate to a sale of 18 ad units instead of just one. 

It's important to note that the use of auto-refresh features isn't always ad fraud. In some cases, web users may utilize auto-refreshing add-ons to check for changing page content. This may be done when trying to purchase tickets to an in-demand show or looking for new posts on a forum. 

Affiliate Marketing

Affiliate Marketing is a type of performance-based marketing in which a business rewards one or more affiliates for each visitor o...Read More

Affiliate Marketing

Affiliate Marketing is a type of performance-based marketing in which a business rewards one or more affiliates for each visitor or customer brought by the affiliate's own marketing efforts. This can be in the form of impressions, clicks, leads, or eCommerce. 

 

CTA-Affiliate-Marketing-Fraud-101-EB 

Anura.io

Anura is an ad fraud solution with almost two decades of development experience driving its success. Our solution helps our client...Read More

Anura.io

Anura is an ad fraud solution with almost two decades of development experience driving its success. Our solution helps our clients find and mitigate some of the most complex types of fraud giving them increased campaign performance, enhanced ROI, and peace of mind from their online marketing campaigns.

 

Anura's Mission

Our mission is to increase our clients’ growth by improving marketing results through accurate and effective ad fraud mitigation. ...Read More

Anura's Mission

Our mission is to increase our clients’ growth by improving marketing results through accurate and effective ad fraud mitigation. We work diligently with our clients to prevent fraudsters from accessing marketing dollars by innovating game-changing technologies.

Anura's Core Values

Authentic-We offer definitive results rather than hiding behind marketing terms/vanity metrics. Nimble-We are constantly updating ...Read More

Anura's Core Values

Authentic-We offer definitive results rather than hiding behind marketing terms/vanity metrics.
Nimble-We are constantly updating our algorithms to adapt quickly to the changing fraud landscape.
Unified-We work closely together as a team to accomplish our mission.
Reliable-Not only does our customers rely on us for accurate data, but they also rely on us to respond to their requests.
Accountable-We hold ourselves accountable to deliver the most accurate solution in the marketplace.

Anura Script

Anura Script, our preferred method of integration, collects hundreds of data points on each visitor to help identify the most adva...Read More

Anura Script

Anura Script, our preferred method of integration, collects hundreds of data points on each visitor to help identify the most advanced fraud techniques. It’s quick and easy JavaScript integration is flexible for any environment.  Anura’s ability to identify real customer activity vs. bots, malware and human fraud allows you to make real-time marketing decisions that boost your ROI.  

Anura Direct

Anura’s flexible integration provides server to server communication to accommodate all environments. Anura Direct is designed to ...Read More

Anura Direct

Anura’s flexible integration provides server to server communication to accommodate all environments. Anura Direct is designed to determine in milliseconds the most common types of fraud (General Invalid Traffic or GIVT) delivering real-time analysis in time-sensitive situations. Ideally used for pre-bid, post ping, scraper bots, email, and more.

Accuracy

Accuracy is at the cornerstone of identifying fraud. When detection measures aren't up to par, it's easy to miss signs of fraud. A...Read More

Accuracy

Accuracy is at the cornerstone of identifying fraud. When detection measures aren't up to par, it's easy to miss signs of fraud. According to Anura client case studies, our systems register virtually zero false positives. That means that our defenses don't block real users, ensuring no loss of potential revenue from actual customers. Most of the competition have false-positive numbers (some in the double digits), putting a significant damper on campaign effectiveness.

Our resources can find gaps the other guys can't – and that means we can make sure no stone goes unturned. When Anura says it's bad, it's bad.

Advertiser

The company or brand paying for the offers that promote their product or service.Read More

Advertiser

The company or brand paying for the offers that promote their product or service.

Ad Network

An advertising exchange that connects advertisers to potential new consumers by way of websites owned by publishers. The idea is t...Read More

Ad Network

An advertising exchange that connects advertisers to potential new consumers by way of websites owned by publishers. The idea is that the ad network collects hundreds or thousands of publishers, aggregating all of their web properties into their network, and then allows advertisers to pay to have their ads shown across the network based on a variety of targeting criteria.

B

Bot

Short for “robot,”  a bot  is an automated software program built to carry out a specific task. Bots do jobs that most people woul...Read More

Bot

Short for “robot,”  a bot  is an automated software program built to carry out a specific task. Bots do jobs that most people would find too repetitive or time-consuming, like answering chat questions easily found on the FAQ page or updating numbers like stock prices at preset intervals. 

Unethical programmers can re-tool bots for malicious purposes in a variety of ways; often designing malicious bots to serve malware, take over networks, steal information, plagiarize content, and steal marketing dollars from unsuspecting advertisers.

Bots usually mimic normal activity and can be hard for advertisers to detect. Bot fraud usually involves the use of bot farms or large collectives of bots that act in unison usually referred to as a botnet. 

 

Backlink Checker Bot

This type of bot is an SEO specialist’s best friend. Backlink checkers crawl websites and search for inbound links to see where tr...Read More

Backlink Checker Bot

This type of bot is an SEO specialist’s best friend. Backlink checkers crawl websites and search for inbound links to see where traffic originates. Using the bots’ findings, SEO specialists can make the necessary website and campaign changes to keep visitors coming. 

bots ebook visual cta

Botnet

As the name suggests, zombie bots turn computers into mindless drones, letting hackers control them remotely without users knowing...Read More

Botnet

As the name suggests, zombie bots turn computers into mindless drones, letting hackers control them remotely without users knowing their machine’s been compromised. A collection of zombie bots makes up a botnet. Here, affected computers work simultaneously to perform a certain task. Botnets are usually responsible for  DDoS attacks.

Brand Safety

The term used to protect the reputation of a brand from having its ads associated with questionable or inappropriate content. What...Read More

Brand Safety

The term used to protect the reputation of a brand from having its ads associated with questionable or inappropriate content. What makes it difficult is that each brand will have different tolerances for what they consider to be safe. For example, what Disney considers brand safe is different than what Victoria Secrets would consider being safe.

C

Click Fraud

Pay Per Click or Cost Per Click advertising is where an advertiser can place their ads onto a site or network and they are only ch...Read More

Click Fraud

Pay Per Click or Cost Per Click advertising is where an advertiser can place their ads onto a site or network and they are only charged when someone clicks on their ad. Fraudsters take advantage of this type of marketing by using bots, malware, or humans to click on ads to make money. In some cases, click fraud is committed by competitors who are trying to deplete the competing company’s advertising budget. 

Click Spamming

Fraudsters use the concept of a Denial of Service (DOS) to attack networks in order to steal money from their advertisers. With a ...Read More

Click Spamming

Fraudsters use the concept of a Denial of Service (DOS) to attack networks in order to steal money from their advertisers. With a click spamming attack, the fraudster floods the network with enough clicks to attempt to overwhelm the networks billing software and trick it into paying the fraudsters. 

Cookie Stuffing

Cookie stuffing is a sub-area of affiliate marketing fraud. Cookies are a big part of tracking web traffic and activities, but coo...Read More

Cookie Stuffing

Cookie stuffing is a sub-area of affiliate marketing fraud. Cookies are a big part of tracking web traffic and activities, but cookie stuffing uses this tool illegitimately to tag users. Fraudsters who cookie stuff, tag web users with cookies from unrelated websites that they did not visit without permission. These stuffed cookies affect how the activities of users are seen online. If, for example, an affiliate marketer directs a customer to make a purchase, the cookies will link back to the fraudster, who will receive credit for the sale.

Chatbot

Chatbots are programs designed to communicate with people using artificial intelligence. Chatbots specialize in answering specific...Read More

Chatbot

Chatbots are programs designed to communicate with people using artificial intelligence. Chatbots specialize in answering specific questions or doing certain tasks. For instance, your bank account may have a 24/7 chatbot that will notify you when any suspicious activity happens within your account. Companies can deploy simple chatbots on platforms like Slack and Facebook Messenger or more advanced chatbot like Amazon’s Alexa. 

Chatbots can be both good and bad. Bad chatbots emulate human interaction by engaging in conversation. These bots attempt to acquire personal information and often reside on service websites like dating sites, messaging apps, or chat rooms. 

Copyright Bot

Online copyright infringement is rampant, especially with so much data being shared every day. To combat plagiarism and theft, cop...Read More

Copyright Bot

Online copyright infringement is rampant, especially with so much data being shared every day. To combat plagiarism and theft, copyright bots scour the web for stolen content, such as music and video clips. Sites like YouTube use copyright bots to flag and disable uploaded content that could be in violation of copyright laws.

 

Click Bot

Advertisers are all too familiar with click bots. These bots intentionally visit sites and click on ads with the goal of warping a...Read More

Click Bot

Advertisers are all too familiar with click bots. These bots intentionally visit sites and click on ads with the goal of warping ad campaign data and burning through an advertiser’s budget. For advertisers who pay on a CPC basis, click bots can be devastating. 

Captcha

Captcha stands for “Completely Automated Public Turing Test to Tell Computers and Humans Apart.” CAPTCHA can disrupt the user expe...Read More

Captcha

Captcha stands for “Completely Automated Public Turing Test to Tell Computers and Humans Apart.” CAPTCHA can disrupt the user experience. By placing a CAPTCHA on your site, marketers can make it harder for bots to “do their job.”  CAPTCHA can block less sophisticated attacks, but if you’re still getting spam, you may need another solution. However, as fraud has evolved, CAPTCHA has lost its edge.

Callback Lead Scams

Fewer prospective customers fill out call back forms than newsletter subscriptions and the like. As such, these are generally high...Read More

Callback Lead Scams

Fewer prospective customers fill out call back forms than newsletter subscriptions and the like. As such, these are generally higher quality leads. That is unless they're fake. Fraudsters often fill out these forms with other people's information in order to receive compensation for doing so. The issue comes in when you call someone who didn't personally provide their consent, which may result in a TCPA-related lawsuit.

Comprehensive Analytics

Analytics are at the crux of identifying fraud, providing a way to capture concerning trends that highlight problematic activity. ...Read More

Comprehensive Analytics

Analytics are at the crux of identifying fraud, providing a way to capture concerning trends that highlight problematic activity. Anura's extensive dashboard allows users to customize reporting with the ability to drill down multiple levels, highlighting areas of primary concern. This tool allows you to pinpoint exactly where the fraud is coming from in order to block fraud with a few simple clicks.

CPC (Cost Per Click)

The billing method the advertiser is charged each time their ad is clicked. It is also known as pay per click (PPC).Read More

CPC (Cost Per Click)

The billing method the advertiser is charged each time their ad is clicked. It is also known as pay per click (PPC).

CPM (Cost for Mille)

The billing method the advertiser is charged for every one thousand times their ad is displayed. It is typically referred to as “C...Read More

CPM (Cost for Mille)

The billing method the advertiser is charged for every one thousand times their ad is displayed. It is typically referred to as “Cost Per Thousand”, however, CPM actually stands for “Cost Per Mille”, Mille is Latin for one thousand.

CPA (Cost per Action)

The billing method the advertiser is charged each time a visitor completes a predetermined action such as completing a purchase, f...Read More

CPA (Cost per Action)

The billing method the advertiser is charged each time a visitor completes a predetermined action such as completing a purchase, filling out a form or downloading an app. CPA is sometimes referred to as “Cost Per Acquisition”.

Contextual

An ad unit that is targeted to the content of the website. A script will “read” the page the ad is going to show on, interpret wha...Read More

Contextual

An ad unit that is targeted to the content of the website. A script will “read” the page the ad is going to show on, interpret what the page is about, and then fetch an ad that is related to the content. A popular example of a contextual ad system is: Google Ad Sense.

Click Bait

A sneaky advertisement that captures your attention and entices you to click on their link (aka the bait). Once you click on the a...Read More

Click Bait

A sneaky advertisement that captures your attention and entices you to click on their link (aka the bait). Once you click on the ad you only see a small piece of content. To see more, you need to click next to move to each page to see additional content while getting exposed to a large number of ads. An example would be “Click here to see the 10 ugliest dogs”. When you click, they show you one image of a dog with a bunch of ads surrounding the content and a button to see the next picture.

CAPTCHA

CAPTCHA is an acronym for “Completely Automated Public Turing test to tell Computers and Humans Apart”.  It is a system designed t...Read More

CAPTCHA

CAPTCHA is an acronym for “Completely Automated Public Turing test to tell Computers and Humans Apart”.  It is a system designed to identify humans versus automated software. This was initially used to block bots from entering certain areas of websites.  As bots became more sophisticated, CAPTCHA software had to evolve, however, it cannot stop human fraud. 

CDN

CDN is a Content Delivery Network that takes content from your server and caches it in high-speed servers around the globe helping...Read More

CDN

CDN is a Content Delivery Network that takes content from your server and caches it in high-speed servers around the globe helping to serve up content faster to people regardless of their location. 

Content Delivery Network

Content Delivery Network is a network that takes content from your server and caches it in high-speed servers around the globe hel...Read More

Content Delivery Network

Content Delivery Network is a network that takes content from your server and caches it in high-speed servers around the globe helping to serve up content faster to people regardless of their location.

Cache

Cache: Is a computer device, either hardware or software, that is designed to store data in a way to be able to serve it up faster...Read More

Cache

Cache: Is a computer device, either hardware or software, that is designed to store data in a way to be able to serve it up faster when the data is requested again. 

D

Data Center

A data center is a physical location that houses the infrastructure to power apps, websites, etc. Since many ad fraud attacks happ...Read More

Data Center

A data center is a physical location that houses the infrastructure to power apps, websites, etc. Since many ad fraud attacks happen from overseas, fraudsters can take advantage of the IPs within the data center to make the traffic appear to be coming from the correct geography. 

Device Spoofing (UA Spoofing)

In order to hide fraudulent traffic coming from the same device, fraudsters employ technology that will make their one device look...Read More

Device Spoofing (UA Spoofing)

In order to hide fraudulent traffic coming from the same device, fraudsters employ technology that will make their one device look like many other devices. This is also referred to as User-Agent spoofing. 

Domain Spoofing

Domain spoofing is the act of driving fraudulent traffic to an illegitimate domain and making it appear as if that traffic comes f...Read More

Domain Spoofing

Domain spoofing is the act of driving fraudulent traffic to an illegitimate domain and making it appear as if that traffic comes from a trusted domain. Many advertisers build lists of trusted domains. When the fraudster spoofs a domain on that list, their traffic will be accepted. Another way is to use a "look-a-like" domain (aka URL substitution) to trick a user into visiting their site or accepting their traffic because their name looks like a trusted domain. 

Digital Advertising

Digital advertising, also known as digital marketing, Internet advertising, online advertising, or web advertising, is a form of m...Read More

Digital Advertising

Digital advertising, also known as digital marketingInternet advertisingonline advertising, or web advertising, is a form of marketing and advertising which uses the Internet to deliver promotional marketing messages to consumers. Typical Way to Purchase Programmatic Ads is by DSP/SSP.

Demand Side Platform (DSP)

Demand Side Platform, aka DSP, is a platform that advertisers use to buy advertising, typically on an impression basis. Read More

Demand Side Platform (DSP)

Demand Side Platform, aka DSP, is a platform that advertisers use to buy advertising, typically on an impression basis. 

Dedicated Support

When you have questions, Anura has answers. Live phone support is available Monday to Friday, from 8 AM to 5 PM at our headquarter...Read More

Dedicated Support

When you have questions, Anura has answers. Live phone support is available Monday to Friday, from 8 AM to 5 PM at our headquarters in Delaware. Anura's software and technology experts are highly experienced in ad fraud detection, ensuring accurate and comprehensive information whenever clients need assistance.

E

eCommerce Fraud

eCommerce, or online shopping, is predicated on conversions. When ads don't convert, placement becomes a question. In order to per...Read More

eCommerce Fraud

eCommerce, or online shopping, is predicated on conversions. When ads don't convert, placement becomes a question. In order to perpetuate eCommerce fraud, some particularly savvy fraudsters will use stolen credit cards to make transactions, creating a false conversion rate that warrants ongoing ad fraud. 

eCommerce

eCommerce is known as electronic commerce or internet commerce, refers to the buying and selling of goods or services using the in...Read More

eCommerce

eCommerce is known as electronic commerce or internet commerce, refers to the buying and selling of goods or services using the internet, and the transfer of money and data to execute these transactions 

F

Feed Fetcher Bot

These bots work around the clock to bring you real-time data like updates on the news, currency exchange, and weather. They also s...Read More

Feed Fetcher Bot

These bots work around the clock to bring you real-time data like updates on the news, currency exchange, and weather. They also specialize in collecting and sending information between websites and mobile or web applications.

File-Sharing Bot

These bots act as malware delivery men. They post malware-infected files on peer-to-peer file-sharing services, such as Dropbox. T...Read More

File-Sharing Bot

These bots act as malware delivery men. They post malware-infected files on peer-to-peer file-sharing services, such as Dropbox. Thinking the file is legitimate, the user downloads it, but they just installed malware onto their computer.

Form Bot

Bad  bots can fill out forms with the aim to access restricted content and make this content publicly available. This, in turn, ma...Read More

Form Bot

Bad  bots can fill out forms with the aim to access restricted content and make this content publicly available. This, in turn, may decrease the income generated through brands relying on premium content or subscription models.

G

Geotargeting Fraud

Geotargeting fraud occurs when an advertiser targets specific geolocation. In this form of fraud, a fraudster sends ads from a dif...Read More

Geotargeting Fraud

Geotargeting fraud occurs when an advertiser targets specific geolocation. In this form of fraud, a fraudster sends ads from a different location, masking it to look like the location the advertiser targeted. 

GIVT

General Invalid Traffic or GIVT refers to bots, crawlers, spiders, or any of the kind of non-human traffic routed from a data cent...Read More

GIVT

General Invalid Traffic or GIVT refers to bots, crawlers, spiders, or any of the kind of non-human traffic routed from a data center IP address. GIVT can also apply to activity-based filtration or browsers that pre-render pages. Most of the time, GIVT is easy to identify and exclude from results.

General Invalid Traffic

General Invalid Traffic or GIVT refers to bots, crawlers, spiders, or any of the kind of non-human traffic routed from a data cent...Read More

General Invalid Traffic

General Invalid Traffic or GIVT refers to bots, crawlers, spiders, or any of the kind of non-human traffic routed from a data center IP address. GIVT can also apply to activity-based filtration or browsers that pre-render pages. Most of the time, GIVT is easy to identify and exclude from results.

H

Human Fraud

Human fraud is the hardest form of ad fraud to detect as it relies on a network of humans, instead of using bots or malware, to in...Read More

Human Fraud

Human fraud is the hardest form of ad fraud to detect as it relies on a network of humans, instead of using bots or malware, to interact with ads and create false transactions. Because actual humans are interacting with the ads, there are no obvious signs that can differentiate normal traffic from human fraud.

HoneyPot

Designed to capture bots without human users noticing, honeypots are a hidden form field that humans can’t see but bots can. They’...Read More

HoneyPot

Designed to capture bots without human users noticing, honeypots are a hidden form field that humans can’t see but bots can. They’ll immediately complete the form, letting the website owner know the user is actually a bot

The only complication with this method is that humans using a screen reader software will see the form and likely fail the test. You could label the field explaining its use, so real visitors know to leave it blank. 

I

Influencer Marketing Fraud

In marketing terms, an influencer is someone who has a large following socially and can "influence" others to make specific buying...Read More

Influencer Marketing Fraud

In marketing terms, an influencer is someone who has a large following socially and can "influence" others to make specific buying decisions. Influencer marketing fraud occurs when an influencer is either using bots or other techniques to artificially inflate their engagement with the advertiser. Sometimes, the influencer isn't even a real person. 

Invalid Traffic

Invalid traffic, often known as IVT, refers to any form of web traffic that is derived from a non-human source. In some cases, thi...Read More

Invalid Traffic

Invalid traffic, often known as IVT, refers to any form of web traffic that is derived from a non-human source. In some cases, this kind of traffic exists for a good reason, like search engine crawlers. However, most of the time, IVT is used to refer to fraudulent traffic

IVT comes in a few different forms, including General Invalid Traffic, or GIVT. GIVT refers to bots, crawlers, spiders, or any of the kind of non-human traffic routed from a data center IP address. GIVT can also apply to activity-based filtration or browsers that pre-render pages. Most of the time, GIVT is easy to identify and exclude from results. 

SIVT stands for Sophisticated Invalid Traffic. SIVT techniques are far more challenging to detect. This can include bots that closely mimic human traffic, hijacked devices, invalid proxy traffic, or cooking manipulation techniques, like stuffing. 

Impression Bot

Fraudsters create decoy web pages full of both print and video ads. These bots continually load and reload these pages to create i...Read More

Impression Bot

Fraudsters create decoy web pages full of both print and video ads. These bots continually load and reload these pages to create impressions, taking views away from legitimate websites, and decreasing their viewability stats.

Impersonator Bot

As their name suggests, impersonator bots disguise themselves as humans and are so advanced as they sometimes go undetected. They ...Read More

Impersonator Bot

As their name suggests, impersonator bots disguise themselves as humans and are so advanced as they sometimes go undetected. They mimic human behavior online, filling out forms and click-through sites. As bots become more sophisticated, security mechanisms like CAPTCHA are becoming easier for bots to crack.

Impression

Impressions can be in the form of display ads, video ads, or banners. Impressions are digital advertisements displayed on someone'...Read More

Impression

Impressions can be in the form of display ads, video ads, or banners. Impressions are digital advertisements displayed on someone's screen. Sold in Cost per Thousand or CPM. An impression is counted every time it is displayed on someone’s web asset. 

J

K

L

Lead Generation Fraud

Lead generation is one of the primary objectives of digital marketing. In a lead generation-focused ad, online advertisements take...Read More

Lead Generation Fraud

Lead generation is one of the primary objectives of digital marketing. In a lead generation-focused ad, online advertisements take users to a landing page where they can sign up to request more information. 

In order to commit lead generation fraud, a fraudster will use a bot, malware, or humans to fill in the lead forms using stolen information, in order to bypass detection. This will create a myriad of issues for the advertiser. 

Lead Generation

Lead Generation is the business of advertising a product or service to consumers, whereby an interested consumer can fill out a fo...Read More

Lead Generation

Lead Generation is the business of advertising a product or service to consumers, whereby an interested consumer can fill out a form expressing interest and expecting more information in return. 

Lead List Fraud

Lead lists are contact lists purchased from a third party. They provide a quick, easy way to gain access to prospective customer i...Read More

Lead List Fraud

Lead lists are contact lists purchased from a third party. They provide a quick, easy way to gain access to prospective customer information. However, not all lead lists are as they appear on the surface. Many are the product of fraudsters. If you purchase one of these, your company just spent money on a list of fake names and numbers — at the very least, on names and numbers that have no connection to your industry and have not provided their consent to be contacted. In most lines of business, lead lists are generally discouraged as a lead generation strategy, since many of the names on a lead list ultimately won't result in any actual conversions. 

M

Malware Ad Fraud

Malware is malicious software installed on an unsuspecting user's computer, either desktop or mobile, that is designed to perform ...Read More

Malware Ad Fraud

Malware is malicious software installed on an unsuspecting user's computer, either desktop or mobile, that is designed to perform specific tasks. For example, it can be used to steal personal information from the user or commit ad fraud. Malware ad fraud hijacks a unique device, mimicking a real user to perform tasks that steal advertising dollars by viewing or clicking on ads, watching videos, filling in forms, and other unsavory activity unbeknownst to the user. 

Mobile In-App Advertising Fraud

Mobile apps are a huge source of advertising. Many apps are fully ad-sponsored, providing a free platform for fun or function for ...Read More

Mobile In-App Advertising Fraud

Mobile apps are a huge source of advertising. Many apps are fully ad-sponsored, providing a free platform for fun or function for users willing to put up with ads from time to time. 

There are a few different ways in which fraudsters can use apps to defraud advertisers, but the primary method involves hiding ads to generate false impressions. Instead of making ads noticeable, like in video or banner form, ads are hidden in places users won't see, collecting impressions but without any user engagement. 

Monitoring Bot

Like digital doctors, monitoring bots make sure your website is running without any issues. These bots can detect where users are ...Read More

Monitoring Bot

Like digital doctors, monitoring bots make sure your website is running without any issues. These bots can detect where users are having trouble on your sites, such as areas of lag or  unresponsiveness.

Mobile In-App Advertising

Mobile In-App advertising is where app developers get paid to serve ads on their apps. The app requests an ad from the network, an...Read More

Mobile In-App Advertising

Mobile In-App advertising is where app developers get paid to serve ads on their apps. The app requests an ad from the network, and the network uses algorithms to identify and deliver the highest paying ad to the user in real-time. 

Mobile Web Advertising

Mobile web advertising is where web developers get paid to serve ads to mobile web visitors. Read More

Mobile Web Advertising

Mobile web advertising is where web developers get paid to serve ads to mobile web visitors. 

N

Native Advertising

Native Advertising is designed to blend their ads with the look and feel of the site to make it harder for an individual to distin...Read More

Native Advertising

Native Advertising is designed to blend their ads with the look and feel of the site to make it harder for an individual to distinguish between an advertisement and regular content.

O

Online Advertising

Online advertising, also known as online marketing, Internet advertising, digital advertising, or web advertising, is a form of ma...Read More

Online Advertising

Online advertising, also known as online marketingInternet advertisingdigital advertising, or web advertising, is a form of marketing and advertising which uses the Internet to deliver promotional marketing messages to consumers. Typical Way to Purchase Programmatic Ads is by DSP/SSP. 

P

Pay Per Call Fraud

Also called cost per call, pay per call is an agreed-upon rate paid by an advertiser for a call that meets minimum call duration. ...Read More

Pay Per Call Fraud

Also called cost per call, pay per call is an agreed-upon rate paid by an advertiser for a call that meets minimum call duration. In most cases, a duration of at least two minutes is required for a call to be considered a billable event, but this can vary based on advertiser needs and preferences. While more difficult to defraud an advertiser than web advertising, some fraudsters do target pay per call models. Calls are typically generated from landing pages that contain phone numbers but can also be bought and sold through call networks. Two techniques used to commit Pay Per Call Fraud are using an overseas call center or an avatar: 

Overseas Call Centers 
With an overseas call center model, call center workers call advertisers and ask relevant questions just long enough to pass the minimum call duration before disconnecting. The advertiser must pay, because the call was long enough, but gained no viable leads in the process. 
Avatars 
When using avatars to commit call fraud, advertisers interact with a pre-recorded message that sounds like a real conversation. Unlike a call center model that uses actual people, avatars are all pre-recorded with a local dialect. The fraudster's goal is to keep the advertiser on the phone long enough to hit the call duration threshold. Successful avatars are very difficult to detect as they are often created after vetting an advertiser's phone routine. 

Pixel Stuffing

Pixel stuffing is a fraudulent technique in which a standard ad is reduced in size and placed in a single pixel. The ad technicall...Read More

Pixel Stuffing

Pixel stuffing is a fraudulent technique in which a standard ad is reduced in size and placed in a single pixel. The ad technically exists on the site and visitors trigger impressions. However, individual pixels aren't visible to the human eye, so viewers aren't able to view these ads. Any impressions generated using pixel stuffing are illegitimate, as visitors are unable to see any advertising in place. Because pixel-stuffed ads take up very little real estate, fraudsters can fill an entire site with pixel-stuffed ads to create the illusion of a significant number of impressions. 

Pay Per Click

Pay per click is used to drive traffic to websites, in which an advertiser pays a publisher (typically a search engine, website ow...Read More

Pay Per Click

Pay per click is used to drive traffic to websites, in which an advertiser pays a publisher (typically a search engine, website owner, or a network of websites) when the ad is clicked. 

Ping post

A lead seller sends (pings) partial lead information to their buyers to determine whether or not they would like to buy the lead. ...Read More

Ping post

A lead seller sends (pings) partial lead information to their buyers to determine whether or not they would like to buy the lead. If the lead matches their criteria, the lead seller will provide the full lead information to the buyer’s system (post).

Pre-bid

This is the step in the RTB (real-time bidding) auction where you decide if you want to bid on the specific digital ad inventory. ...Read More

Pre-bid

This is the step in the RTB (real-time bidding) auction where you decide if you want to bid on the specific digital ad inventory. During this step, you can use an ad fraud solution to scan for GIVT (General Invalid Traffic) to help you make the decision.

Post-bid or Post-Click

After you win the RTB (real-time bidding) auction and your ad shows, you can run your ad fraud solution to collected valuable targ...Read More

Post-bid or Post-Click

After you win the RTB (real-time bidding) auction and your ad shows, you can run your ad fraud solution to collected valuable targeting data and make real-time decisions on how to handle the visitor that is interacting with your web asset.

Publisher

A company or individual that owns a website where they publish a variety of content in order to build an audience. Publishers typi...Read More

Publisher

A company or individual that owns a website where they publish a variety of content in order to build an audience. Publishers typically monetize their audience by placing advertisements throughout their website and those ads are usually managed by an ad network or supply-side platform (SSP).

Q

Quotes

Quotes are a popular lead generation mechanism for businesses such as insurance companies that offer customized feedback for each ...Read More

Quotes

Quotes are a popular lead generation mechanism for businesses such as insurance companies that offer customized feedback for each potential client. This can be an effective way to entice prospective customers with an appealing deal, but it also opens the door for fraudsters. For companies giving insurance or financial-related quotes, lead generation fraud can compromise the integrity of databases and threaten companies' reputations as well as causing financial hardship.

R

ROI (Return on Investment)

Return on investment, or ROI, refers to the returns yielded by investing in a particular cause or opportunity.Read More

ROI (Return on Investment)

Return on investment, or ROI, refers to the returns yielded by investing in a particular cause or opportunity.

Real-time Response

A response that happens nearly instantaneously giving you enough time to make decisions before the fraudster has a chance to cause...Read More

Real-time Response

A response that happens nearly instantaneously giving you enough time to make decisions before the fraudster has a chance to cause an issue.

Real-Time Bidding

RTB stands for Real-Time Bidding. This is the part of an ad exchange that let’s buyers use their own criteria to determine if and ...Read More

Real-Time Bidding

RTB stands for Real-Time Bidding. This is the part of an ad exchange that let’s buyers use their own criteria to determine if and how much they should bid for a specific ad unit. They can use data such as retargeting, interest-based targeting, ad fraud solution responses, etc.

reCAPTCHA

This version of CAPTCHA is a service that is popular and offered by Google. It is designed to rate interactions with its test to a...Read More

reCAPTCHA

This version of CAPTCHA is a service that is popular and offered by Google. It is designed to rate interactions with its test to attempt to determine the difference between humans and bots. Version 1 was the test that had a human check the box to prove they were not a bot.  Version 2 became more complex with a fair percentage of humans failing to pick similar pictures.  Version 3 requires no human interaction to do its test, but simply scores the user leaving the decision process up to the website owner. 

S

Search Engine Bot

A crawler or spider is a bot that crawls web pages on behalf of search engines. They process and analyze the content of a web page...Read More

Search Engine Bot

A crawler or spider is a bot that crawls web pages on behalf of search engines. They process and analyze the content of a web page to figure out its meaning and relevance. Depending on what they find, search engines can use that info to gauge a page’s reliability and organic  SERP  ranking.

Social Network Bot

Ever wonder how certain posts appear in your social news feeds? Social networks like Facebook and Twitter rely on proprietary bots...Read More

Social Network Bot

Ever wonder how certain posts appear in your social news feeds? Social networks like Facebook and Twitter rely on proprietary bots to run data through  algorithms  and serve posts based on user behavior.

Scaper Bot

Scraper bots "scrape" or steal high-quality, keyword-rich content from other websites and repurpose it on their own sites, skewing...Read More

Scaper Bot

Scraper bots "scrape" or steal high-quality, keyword-rich content from other websites and repurpose it on their own sites, skewing your website's search engine rankings. Stolen content can be hard to spot unless you make a point to search for it. 

Spam Bot

These bots plague comment sections, lead forms, and email inboxes spreading unsolicited messages, advertising links, and other for...Read More

Spam Bot

These bots plague comment sections, lead forms, and email inboxes spreading unsolicited messages, advertising links, and other forms of spam. Spambots are also programmed to  phish  for personal information that users submit through forms, such as phone numbers, email addresses, and passwords.

Spy Bot

Fraudsters use spy bots mainly for surveillance and data collection purposes. Spy bots steal personal information about a company,...Read More

Spy Bot

Fraudsters use spy bots mainly for surveillance and data collection purposes. Spy bots steal personal information about a company, website, or person by logging  keystrokes  or intercepting  packets. Some fraudsters sell that data to outside parties such as a competitor of a marketing firm for a profit.

Subscriptions

Subscriptions are another common form of lead generation tools, giving users access to information like white papers, newsletters,...Read More

Subscriptions

Subscriptions are another common form of lead generation tools, giving users access to information like white papers, newsletters, or e-books in exchange for basic contact details. These kinds of forms don't require a significant amount of data, so they're a relatively easy way to collect information. However, this means that subscription sign-ups are easier to scam than other alternatives. Fraudsters enter false information and, when businesses reach out, they're confronted with an illegitimate lead. 

Supply Side Platform (SSP)

Supply Side Platform, aka SSP, aggregates high-end traffic sources in order to monetize them through DSP’s (Demand Side Platforms)...Read More

Supply Side Platform (SSP)

Supply Side Platform, aka SSP, aggregates high-end traffic sources in order to monetize them through DSP’s (Demand Side Platforms) 

SIVT

SIVT stands for Sophisticated Invalid Traffic. SIVT techniques are far more challenging to detect. This can include bots that clos...Read More

SIVT

SIVT stands for Sophisticated Invalid Traffic. SIVT techniques are far more challenging to detect. This can include bots that closely mimic human traffic, hijacked devices, invalid proxy traffic, or cooking manipulation techniques, like pixel stuffing.

Sophisticated Invalid Traffic

SIVT stands for Sophisticated Invalid Traffic. SIVT techniques are far more challenging to detect. This can include bots that clos...Read More

Sophisticated Invalid Traffic

SIVT stands for Sophisticated Invalid Traffic. SIVT techniques are far more challenging to detect. This can include bots that closely mimic human traffic, hijacked devices, invalid proxy traffic, or cooking manipulation techniques, like pixel stuffing.

T

Trader Bot

Similar to spider bots, trader bots crawl around the web for pricing information. Online retailers like eBay and Amazon use trader...Read More

Trader Bot

Similar to spider bots, trader bots crawl around the web for pricing information. Online retailers like eBay and Amazon use trader bots to keep an eye on their rivals and offer competitive pricing or more detailed product information.

Transfer Bot

Sometimes called download bots, transfer bots are responsible for forced  redirects. Transfer bots attach themselves to reputable ...Read More

Transfer Bot

Sometimes called download bots, transfer bots are responsible for forced  redirects. Transfer bots attach themselves to reputable websites and wait for users to click through. Instead of sending users to the site they requested, transfer bots redirect them to another site, usually one set up by a fraudster or hacker.

TCPA

Telephone Consumer Protection Act (TCPA) The laws surrounding telephone use may not seem that important, but in the world of lead ...Read More

TCPA

Telephone Consumer Protection Act (TCPA)

The laws surrounding telephone use may not seem that important, but in the world of lead follow-up, it's critical to play by the rules. TCPA is a federal law passed in 1991 that prohibits telemarketing calls to landlines without the prior consent of the owner. In the two decades since the Act's passage, this legislation has expanded to include mobile phone communication, including both voice and text messages. 

The TCPA was passed in response to a growing concern involving privacy in the face of unsolicited calls – a good thing for consumers but not so good for business. With the passage of this act, the Federal Communications Commission was given the right to charge companies for making unsolicited texts or calls with fines ranging anywhere from $500 to $1,500 for each violation. For companies that make hundreds or even thousands of calls per day, this seemingly small amount can add up quickly

Thoroughness

A great ad fraud protection service needs to be thorough. Anura is committed to covering as many bases as possible, addressing vir...Read More

Thoroughness

A great ad fraud protection service needs to be thorough. Anura is committed to covering as many bases as possible, addressing virtually every known area of ad fraud. With a proprietary solution that works around the clock to detect all threats to advertising, our clients report that we find 200% to 300% more fraud than the competition.

U

UA spoofing

In order to hide fraudulent traffic coming from the same device, fraudsters employ technology that will make their one device look...Read More

UA spoofing

In order to hide fraudulent traffic coming from the same device, fraudsters employ technology that will make their one device look like many other devices. This is also referred to as User-Agent spoofing.

V

Verification Stripping

Verification stripping is a nefarious tactic that fraudsters use to manipulate code. By using bots or malware, they strip the code...Read More

Verification Stripping

Verification stripping is a nefarious tactic that fraudsters use to manipulate code. By using bots or malware, they strip the code that’s used to verify impressions. This enables them to hide any signs that domain spoofing or other types of fraud is occurring (e.g. pixel stuffing, ad stacking, bot traffic).  

Viewability Fraud

The IAB definition defines viewability as "Greater than or equal to 50% of the pixels in the advertisement were on an in-focus bro...Read More

Viewability Fraud

The IAB definition defines viewability as "Greater than or equal to 50% of the pixels in the advertisement were on an in-focus browser tab on the viewable space of the browser page, and the time the pixel requirement is met was greater than or equal to one continuous second, post ad render." In essence, this means at least half of your ad is in-view for a minimum of one second. Display ads are sold based on this viewability standard. Fraudsters know how to hide ads and trick the measurement companies into thinking they were in-view when, in reality, they are not. It's also important to note that the definition of viewability doesn't specify who is viewing the ad. Instead of a legitimate person, it could be a bot, malware, or a human fraud farm.

W

Web RTC

Web RTC is a free, open-source project that provides web browsers and mobile applications with real-time communication (RTC) via s...Read More

Web RTC

Web RTC is a free, open-source project that provides web browsers and mobile applications with real-time communication (RTC) via simple application programming interfaces (APIs). It allows audio and video communication to work inside web pages by allowing direct peer-to-peer communication, eliminating the need to install plugins or download native apps (as defined by Wikipedia)

Web Real-Time Communications

Web RTC is a free, open-source project that provides web browsers and mobile applications with real-time communication (RTC) via s...Read More

Web Real-Time Communications

Web RTC is a free, open-source project that provides web browsers and mobile applications with real-time communication (RTC) via simple application programming interfaces (APIs). It allows audio and video communication to work inside web pages by allowing direct peer-to-peer communication, eliminating the need to install plugins or download native apps (as defined by Wikipedia)

X

Y

Z

Zombie Bot

As the name suggests, zombie bots turn computers into mindless drones, letting hackers control them remotely without users knowing...Read More

Zombie Bot

As the name suggests, zombie bots turn computers into mindless drones, letting hackers control them remotely without users knowing their machine’s been compromised. A collection of zombie bots makes up a botnet. Here, affected computers work simultaneously to perform a certain task. Botnets are usually responsible for  DDoS attacks.

Get the Latest Updates from Anura

Subscribe to Email Updates