Violations
This is the complete list of violations that our system will help you detect:
Violation | Description |
---|---|
Adware | Adware is software that downloads or displays unwanted ads when a user is online, collects marketing data and other information without the user’s knowledge, or redirects search requests to certain advertising websites. |
Auto-download | Ads that automatically download a file/executable/application without user interaction. |
Auto-redirect | Ad that contains a script causing a web page to break out of any frames "framing" it, resulting in redirecting the visitor to another website/page. |
Auto-redirect app store | Ads that is automatically redirecting to the App Stores without user interaction. |
Auto-sound | Ads that automatically play audio whenever you visit a website. |
Auto-vibrate | Ads that automatically vibrate the user’s device when reaching a landing page. Malicious use of the HTML5 vibrate API. |
Back Button Hijack | Ads containing a script that allows an advertiser to manipulate the browser history. Usually it consists in inserting one or several pages in the browser history, which would prevent the user to go back to the previous page he was coming from. |
Browser Locker | The script runs in the web browser and its main purpose is to disable any form of action that can close the browser – such as clicking the close button and pressing certain shortcut keys. All attempts to close the browser will result in a warning message box (Javascript alerts). |
Drive-by mining | Ads that consists in using a piece of javascript code to mine different cryptocurrencies directly through the visitor’s browser. |
JS Alert on entry | Javascript alert that pops up without user interaction when entering on a website. |
JS Alert on exit | Javascript alert that pops up when the user wants to close the active tab. |
Malicious URL | Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure unsuspecting users to become victims of scams (monetary loss, theft of private information, and malware installation). |
Malware | Malware is a general category of malicious code that includes viruses, worms and Trojan horse programs. It is used to disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising |
Phishing URL | A phishing site might trick users into revealing their personal information (for example, passwords, phone numbers, or credit cards). The content pretends to act, or looks and feels, like a trusted entity — for example, a browser, operating system, bank, or government. |
Potentially Unwanted Programs (PUP) | Unwanted software is an executable file or mobile application that engages in behavior that is deceptive, unexpected, or that negatively affects the user’s browsing or computing experience. |
Ransomware | Ransomware is a form of malware that essentially holds a computer system captive while demanding a ransom. The malware restricts user access to the computer either by encrypting files on the hard drive or locking down the system and displaying messages. |
Scareware | Ads claiming that you have a virus and you are in need of anti-virus software may, ironically, actually contain a virus that could harm your computer, cause costly repairs or, even worse, lead to identity theft. Scammers often use the names of well-known companies that specialise in computer software to gain your trust. The pop-up advertisements aim to mimic genuine warning alerts generated by computer security software. |
SSL non-compliant | Ad that contains at least one unsecured item in the chain of resources (unsafe, no https, mixed content, ssl version or cipher mismatch). |