Monday, November 25, 2024
HomeFACEBOOKFacebook Taken Down Number of Political ads due to Technical Flaws in...

Facebook Taken Down Number of Political ads due to Technical Flaws in their System

Published on

Facebook on Thursday acknowledged that a technical error in its systems caused a variety of ads from both political parties to be improperly paused.

The error stems from a policy change that Facebook announced in early September to stop any new political ads in the week before the United States presidential election scheduled for Tuesday, November 3, 2020. This restriction took effect at 12:01 AM PT on October 27th.

Facebook issued an update saying we began restricting new political and issue ads before next week’s election so that all political ads would be searchable in our public ad library beforehand of polling day.

- Advertisement - SIEM as a Service

After the restriction took effect, the bulk of political and issue ads are unaffected however we have identified a variety of unanticipated issues affecting campaigns of both political parties.

Some were technical problems, others were because advertisers didn’t understand the instructions we provided about when and how to make changes to ad targeting, Facebook said.

“We have implemented changes to repair these issues, and most political ads are now running with no problems. “

We are continuing to monitor closely to make sure all of our fixes work and ads are running as intended well in advance of the election.

Technical Flaw

Facebook mentions ‘Technical flaws in our systems’ ability to detect that an ad has been properly recorded within the Ad Library caused a variety of ads to be paused improperly and prevented advertisers from making permissible changes to their ads. This impacted a little proportion of the ads about politics and social issues in our system.

Investigation

After investigating these technical issues, “we detected a variety of ads were paused because advertisers had made changes to the targeting shortly before the deadline, which had created new ads that needed to travel through approval and delivery before the deadline passed.”

While speaking with advertisers and reviewing our instructions again, we realized that we could have been more clear on edit targeting during or before the restriction period, Facebook said.

Facebook confirms that “No ad was paused or rejected by an individual or due to partisan consideration”.

Most of the problems are fully addressed except for any advertisers still facing issues; there are several steps they can take to help their ads reach people.

They can also pause ads and resume them as long as those ads delivered an impact before the restriction took effect. The company ensures to resolve any problems which will come up as quickly as possible.

You can follow us on Linkedin, TwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read

Facebook Hacking made Easy and Convenient with Numerous Hacking Apps

Facebook Announced New Privacy and Security Feature for Messenger

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

SYS01 InfoStealer Malware Attacking Meta Business Page To Steal Logins

The ongoing Meta malvertising campaign, active for over a month, employs an evolving strategy...

PrestaShop Website Under Injection Attack Via Facebook Module

A critical vulnerability has been discovered in the "Facebook" module (pkfacebook) from Promokit.eu for...