The Audience Hijacking Protector by Akamai is a cloud-based solution to help protect in-browser attacks including marketing fraud and other malicious redirections. Aiming to reduce affiliate fraud and mitigate privacy risks, web and internet security company Akamai has released Audience Hijacking Protector, a cloud-based solution designed to minimize in-browser marketing frauds by blocking unwanted redirections like unauthorized ads and pop-ups.Promising protection from possible revenue loss and disrupted customer experiences, the new hijacking protector, generally available now, offer features to defend against unwanted redirection of customers to competing and malicious websites.“The browser is often an ignored area for application behavior control,” says Patrick Sullivan, CTO of security strategy at Akamai. “But in-browser protections are a key area for effective business and security controls. Audience Hijacking Protector gathers unique data that generates actionable insights to maximize revenue opportunities and minimize fraud.”Audience Hijacking Protector uses a machine-learning algorithm that monitors and characterizes browser extension activities —both legitimate and illegal — for categories including purchases, browser hijacking, price comparisons, selling of user data, price comparisons, and competitor’s ads. These extensions are controllable across each category and can have different rules for different situations. Browser data analysis helps implement business rulesAccording to Sullivan, Audience Hijacking Protector can be activated in minutes and automatically runs in the background, collecting and analyzing browser data to help implement effective business rules.“Traditionally ad fraud is fought through visibility and analysis of traffic, but bad actors, knowing that ad fraud is a big, lucrative business, have gotten far more sophisticated.” says Liz Miller, an analyst at Constellation Research. “So, the market needs new AI-powered, multi-focused methods of monitoring, detection, mitigation and reporting. There are several competitors to the Akamai solution out there, but what makes this offering interesting is Akamai’s long-standing posture as a leading content delivery network (CDN) and web application and API protection (WAAP) with tools like Kona Site Defender.” While the new hijacking protector promises a full protection from malicious redirects, could it block legitimate redirections, designed as a third-party tie-up or a cross sell landing page? According to Miller, although it is rare that these tools will block authentic and legitimate traffic redirects, it is not completely impossible. “The key is for the teams to strategize and define where and what desirable vs undesirable redirects look like” she adds.As part of the announcement for Audience Hijacking Protector, Akamai also unveiled additional products and capabilities for online businesses.Page Integrity Manger enhancements: New features protect against in-browser exfiltration and other script-based attacks through Akamai’s in-house threat intelligence, Akamai ETP. Also added is a policy layer enhancement that enables businesses to build custom detections.API Data Loss Prevention: Allows businesses to discover where personally identifiable information (PIIs) may be leaked or used by APIs.App & API Protector Custom Rule Builder: Provides businesses with a custom rule builder featuring additions like sampling intervals, more match conditions, and enhanced user massaging.Managed alerting for Bot manager: Akamai’s Managed Security Service has undergone an upgrade to provide better and real time alerting to improve bot detection accuracy. Related content news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Android Security Mobile Security news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management news Cybersecurity experts raise concerns over EU Cyber Resilience Act’s vulnerability disclosure requirements Open letter claims current provisions will create new threats that undermine the security of digital products and individuals. By Michael Hill Oct 03, 2023 4 mins Regulation Compliance Vulnerabilities feature The value of threat intelligence — and challenges CISOs face in using it effectively Knowing the who, what, when, and how of bad actors and their methods is a boon to security, but experts say many teams are not always using such intel to their best advantage. By Mary K. Pratt Oct 03, 2023 10 mins CSO and CISO Advanced Persistent Threats Threat and Vulnerability Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe