Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Ad blocking
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Security=== Another important aspect is improving security; online advertising subjects users to a higher risk of infecting their devices with [[computer virus]]es than surfing pornography [[website]]s.<ref>{{cite web |url=https://www.pcmag.com/news/307680/online-advertising-more-likely-to-spread-malware-than-porn |title=Online Advertising More Likely to Spread Malware Than Porn |work=PCMAG |first=Stephanie |last=Mlot |date=1 February 2013 |access-date=23 March 2019 |archive-date=11 November 2019 |archive-url=https://web.archive.org/web/20191111142534/https://www.pcmag.com/news/307680/online-advertising-more-likely-to-spread-malware-than-porn |url-status=live }}</ref> In a high-profile case, the malware was distributed through advertisements provided to [[YouTube]] by a malicious customer of [[Google]]'s [[Doubleclick]].<ref>{{cite web |url=https://www.heise.de/security/meldung/YouTube-angeblich-als-Virenschleuder-missbraucht-2125073.html |title=YouTube angeblich als Virenschleuder missbraucht |work=heise.de |first=Ronald |last=Eikenberg |date=26 February 2014 |access-date=23 March 2019 |language=de |archive-date=23 March 2019 |archive-url=https://web.archive.org/web/20190323225449/https://www.heise.de/security/meldung/YouTube-angeblich-als-Virenschleuder-missbraucht-2125073.html |url-status=live }}</ref><ref>{{cite web |url=http://labs.bromium.com/2014/02/21/the-wild-wild-web-youtube-ads-serving-malware/ |title=The Wild Wild Web: YouTube ads serving malware |work=Bromium Labs |date=21 February 2014 |first=McEnroe |last=Navaraj |url-status=dead |archive-url=https://web.archive.org/web/20170323111707/http://labs.bromium.com/2014/02/21/the-wild-wild-web-youtube-ads-serving-malware/ |archive-date=23 March 2017 |access-date=23 March 2019}}</ref> In August 2015, a [[0-day exploit]] in the Firefox browser was discovered in an advertisement on a website.<ref>{{cite web |url=https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/ |title=Firefox exploit found in the wild |work=Mozilla Security Blog |first=Daniel |last=Veditz |date=6 August 2015 |access-date=23 March 2019 |archive-date=7 August 2015 |archive-url=https://web.archive.org/web/20150807111017/https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/ |url-status=live }}</ref> When Forbes required users to disable ad blocking before viewing their website, those users were immediately served with pop-under malware.<ref name="blockthat">{{cite web |title=You say advertising, I say block that malware |publisher=Engadget |date=8 January 2016 |url=https://www.engadget.com/2016/01/08/you-say-advertising-i-say-block-that-malware/ |first=Violet |last=Blue |access-date=23 March 2019 |archive-date=25 August 2017 |archive-url=https://web.archive.org/web/20170825102009/https://www.engadget.com/2016/01/08/you-say-advertising-i-say-block-that-malware/ |url-status=live }}</ref> The [[Australian Signals Directorate]] recommends individuals and organizations block advertisements to improve their [[information security]] posture and mitigate potential [[malvertising]] attacks and machine compromise.<ref>{{cite web |author=Australian Signals Directorate |title=Strategies to Mitigate Cyber Security Incidents β Mitigation Details |url=https://acsc.gov.au/infosec/top-mitigations/mitigations-2017-details.htm |publisher=Commonwealth of Australia |access-date=23 March 2019 |quote=Block Internet advertisements using web browser software (and web content filtering in the gateway), due to the prevalent threat of adversaries using malicious advertising (malvertising) to compromise the integrity of legitimate websites to compromise visitors to such websites. Some organisations might choose to support selected websites that rely on advertising for revenue by enabling just their ads and potentially risking compromise. |archive-date=2 March 2019 |archive-url=https://web.archive.org/web/20190302012904/https://acsc.gov.au/infosec/top-mitigations/mitigations-2017-details.htm |url-status=live }}</ref> The information security firm [[Webroot]] also notes employing ad blockers provides effective countermeasures against malvertising campaigns for less technically sophisticated computer users.<ref>{{cite web |title=A Guide to Avoid Being a Crypto-Ransomware Victim |url=https://www-cdn.webroot.com/4515/0463/3759/SMB_Guide_to_Avoid_Being_Ransomware_Victim.pdf |publisher=[[Webroot|Webroot Inc.]] |access-date=23 March 2019 |pages=6 |quote=While many websites need advertisements to stay online, we have seen more and more popular websites (i.e. millions of visitors a year) infecting customers due to 3rd party hosted adverts on their websites β malvertising. [...] Ad blocker plugins can be installed and left without any user input and are very useful for stopping less technical users from being infected. |archive-date=23 March 2019 |archive-url=https://web.archive.org/web/20190323225450/https://www-cdn.webroot.com/4515/0463/3759/SMB_Guide_to_Avoid_Being_Ransomware_Victim.pdf |url-status=live }}</ref> Ad blocking is recommended by the [[FBI]] to prevent online scams.<ref>{{cite news |last1=Shah |first1=Saqib |date=22 December 2022 |title=The FBI is advising people to use an ad blocker as part of an online scam warning |language=en |work=[[Evening Standard]] |url=https://www.standard.co.uk/tech/fbi-recommends-ad-blocker-online-scams-b1048998.html |access-date=25 February 2023}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)