Articles > Cybersecurity >听What is malvertising and how can it be prevented?
Written by Michael Feder
Reviewed by听Kathryn Uhles, MIS, MSP,听Dean, College of Business and IT
Over the past decade, hackers have grown more advanced and confident in their attempts to steal sensitive information. Cybercriminals will attempt to access bank details, passwords and other private data to disrupt a computer or a network鈥檚 security. Known collectively as听malware, these malicious advertising programs are often difficult to deactivate, particularly once a hacker has gained access to a device, server or network.
Malvertising is the short form word for malware advertising.
In the past, a strong password and safe internet browsing habits could usually keep a user safe from hackers. Today, that鈥檚 not enough. The听future of cybersecurity will likely require additional protective measures, including firewalls and VPNs, to keep personal and professional information safe.
From 2015 to 2023, hackers attempted听more than 67听worldwide.听Every day, the AV-TEST Institute registers more than 450,000 new malicious programs.听听According to the consulting firm Deloitte,听more than 听begin with a malicious email that, once opened, grants a hacker access to private data.
The use of malicious online ads to illegally distribute malware is just one way hackers work to gain access to private data. Typically, hackers use this type of malicious software to exploit vulnerabilities and inject malware directly into online advertisements. Hackers can even use it across legitimate websites: When people click on innocent-looking ads, they can inadvertently trigger an upload of malicious code.
Today, it is steadily gaining steam as an aggressive form of malware, one that can impact device health and result in lost information.
Malvertising can affect a variety of devices, including computers, tablets and mobile phones. In fact, any device that stores passwords and bank details may be susceptible to it. It can also affect a device even before hackers access sensitive information.
Slow operating speeds are one of the first signs of malware on a device. If webpages take longer to load, messages take longer to send or programs take longer to open, a device may be infected by malware as a result of this type of attack. As malware attempts to access personal data, it typically consumes large portions of a device鈥檚 memory and processing power, resulting in slower processing speed.
Then听malware works to gain access to files quickly. As it does, the user may notice they are having trouble accessing their private information. For example, they might find themselves locked out of a database storing passwords. Similarly, they might discover they can no longer access digital financial records.听
Pop-up messages and other forms of spam are other indicators of this malicious software. Users might begin to notice unexpected redirects when web browsing, new search toolbars or unfamiliar programs. There might also be spam messages, freezing screens or disabled firewall tools.
No matter how proactive someone is about avoiding malware, malvertising is intimidating. Fortunately, there are steps to prevent this type of malicious software or limit the damage if it gains access to devices.
IT professionals advise users to avoid clicking on ads altogether, no matter how legitimate they look. Users are better off doing a Google search for something that catches their eye, rather than clicking on an ad.
听
One of the first preventive steps is to install an antivirus program on devices. Look for antivirus programs that are easy to manage and that regularly scan for malware.
It鈥檚 also important to find an antivirus program that backs up important files so that, should malvertising compromise the security of the device, files will be secure.
Real-time scanning often separates the best antivirus programs from the rest. If听 a particular advertisement ;ools suspicious, or want the peace of mind that a device is secure from any of these malicious efforts, an antivirus program can run an on-demand scan to secure files. Then, if the scan identifies unfamiliar files, steps can be taken to eliminate them.
Ad-blockers can also help protect devices from these malicious attacks. While antivirus programs protect an entire device from malware attacks, ad-blocking programs scan devices specifically for malvertising. This feature makes ad-blockers extremely valuable in preventing attempts before they materialize.
Depending on ad preferences, ad-blockers can function in a few ways. Many ad-blocking programs can disable all ads on a device. If a user wants to see personalized ads from specific retailers they trust, they can choose to have the ad-blocker filter ads before they鈥檙e shown. As an added feature,听many ad-blockers can also disable ad tracking, which prevents a device from sharing personal information with targeted advertisers.
Plug-ins are specific pieces of software that customize听 apps or internet browsing process in some way. For example, some browser plug-ins might help take notes, capture screenshots or locate coupons for an online purchase. Despite their usefulness, plug-ins always carry a cybersecurity risk. Many hackers听disguise malicious advertising as a helpful plug-in. Once an individual downloads that plug-in, hackers can easily access their information.
To better protect against this, consider disabling some or all plug-ins. If a plug-in is active, make sure to research its creator. Read verified user reviews about the plug-in to ensure that it operates well and is secure against malvertising and other forms of malware.
If a plug-in is no longer supported by its developer, it can be hacked by cybercriminals. Even if a particular plug-in is trusted, check to ensure it receives regular security updates. These updates help protect plug-in code against new forms of this malicious software.
Updating devices is one of the best ways to keep them safe from this type of harm. Check devices to determine whether updates are automatic or manual. Schedule time to download new operating systems that guard against emerging harmful forms to manually update devices.
Once a device is updated, check to see if its applications have corresponding updates. Update both the device and all programs to avoid discrepancies between the operating system and program systems.
Downloading security programs for a device is a great first step toward keeping information safe. However, it鈥檚 also important to commit to regularly updating device security. Updating security programs can help improve a device鈥檚 efficiency while preventing new forms of malvertising.
As hackers develop more aggressive forms of this malware, information technology professionals can help reduce the risk for individuals and organizations.
Those interested in learning how to keep devices safe, can learn more by听pursuing a career in cybersecurity or a related听online technology degree. A bachelor鈥檚 degree in cybersecurity teaches some of the more necessary, foundational cybersecurity skills. A听Master of Information Systems degree educates cybersecurity leaders by developing skills in information systems management, programming, and computer science.
果冻视频 offers online course collections and bachelor鈥檚 and master鈥檚 degrees in several cybersecurity and related fields:
Contact a 果冻视频 representative for more information.
A graduate of Johns Hopkins University and its Writing Seminars program and winner of the Stephen A. Dixon Literary Prize, Michael Feder brings an eye for detail and a passion for research to every article he writes. His academic and professional background includes experience in marketing, content development, script writing and SEO. Today, he works as a multimedia specialist at 果冻视频 where he covers a variety of topics ranging from healthcare to IT.
Currently Dean of the College of Business and Information Technology,听Kathryn Uhles has served 果冻视频 in a variety of roles since 2006. Prior to joining 果冻视频, Kathryn taught fifth grade to underprivileged youth in Phoenix.
This article has been vetted by 果冻视频's editorial advisory committee.听
Read more about our editorial process.
Learn how 100% of our IT degree and certificate programs align with career-relevant skills.
Download your pdf guide now. Or access the link in our email.