AARP Fraud Watch Network - Links you with experts, law enforcement and people like you who are on the lookout for scams. Check out the latest alerts from state Attorneys General and other local officials, read what people are reporting in your state, and let AARP know about any suspicious emails, phone calls or other scams you've seen in your area.
Artists Against 419 - Advance Fee Fraud has been around, in various
forms, for centuries. The basic technique is to convince a victim that they are going to receive a large reward in return for little or no effort
on their part. Once the victim is 'hooked', the fraudster(s) will gradually reveal various fees that must be paid before the victim can access the
fortune that they believe is waiting for them. These fees may be in the form of bribes to officials, duties, taxes, account fees, etc. As each charge
is paid by the gullible victim, a new fee arises. Naturally, there is never any reward, and this process continues until the victim realises what
is happening, or simply runs out of money. This site is run by an international community of individuals dedicated to fighting advance fee "419" fraud and
other online scams.
Attrition - Computer security Web site dedicated to the collection, disemination and distribution
of information about the industry. They maintain a large catalog of security advisories, cryptography, text files, and denial of service attack information.
AVG - A global leader in mobile security, PC optimization, Internet security and privacy software.
Avoiding Online Job Scams - Job seekers who use online job
search web sites must be careful to avoid a type of job scam in which the applicant is asked to accept payment to his or her own bank account. These
are known as payment-forwarding or payment-transfer scams.
Computer Crime and Intellectual Property Section (CCIPS) - Section attorneys advise federal
prosecutors and law enforcement agents; comment upon and propose legislation; coordinate international efforts to combat computer crime; litigate
cases; and train law enforcement groups. Other areas of expertise possessed by CCIPS attorneys include encryption, electronic privacy laws,
search and seizure of computers, e-commerce, hacker investigations, and intellectual property crimes.
F-Secure - Provides security software and services.
Fraud - Report suspected Internet and telemarketing fraud online or phone 800-876-7060.
FS/ISAC - Subsidiary of Science Application International Corporation (SAIC) provides
a full complement of information protection, electronic commerce security, consulting, and engineering services worldwide.
Hoax-Slayer - Debunking email hoaxes and exposing Internet scams.
How to Avoid Investment Scams (SEC) - This alert tells you how to spot
different types of Internet fraud, what the SEC is doing to fight Internet investment scams, and how to use the Internet to invest wisely.
Internet Crime Complaint Center (IC3) - A partnership between the Federal Bureau of Investigation
(FBI), the National White Collar Crime Center (NW3C), and the Bureau of Justice Assistance (BJA). Serves as a vehicle to
receive, develop, and refer criminal complaints regarding the rapidly expanding arena of cyber crime. IC3 provides a convenient and easy-to-use
reporting mechanism that alerts authorities of suspected criminal or civil violations. For law enforcement and regulatory agencies at the federal,
state, local and international level, IC3 provides a central referral mechanism for complaints involving Internet related crimes.
Internet Crimes Group, Inc. (ICG) - Internet consulting and investigative service. Assists clients
in identifying individuals or groups abusing the anonymity of the Internet to engage in improper or illegal activities.
Internet Hoaxes (Marcus P. Zillman) - Blog designed to provide information on Anti-Virus,
Anti-Hoax, Anti-Myth, Anti-Fraud, Anti-Chain Letter and Anti-Spam sites on the Internet.
PhishMe - PhishMe's intelligence-driven solutions empower employees to be an active line of defense and source of attack intelligence by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats.
Purportal - Search engine for Snopes Urban Legends Archives, About.com Urban Legends search,
CIAC Hoax Database, CERT Computer Security Database. Use the search boxes to investigate suspicious email messages or web pages.
Scam Victims United - Offers support and resources to victims through message groups
and networking with other victims.
Scambusters - Information, resources, and further links related to Internet scams, viruses and virus
hoaxes. Resources on how to avoid the most popular scams, identity theft threats, and urban legends making the rounds.
ScamWatch - Scam alerts, investigation, tracking, recording and removal of fraudulent activities
on the Internet.
Too Good to Be True - Developed to educate and help prevent consumers from becoming the victim
of an Internet fraud scheme. Funding for the site has been provided by the United States Postal Inspection Service and the Federal Bureau
ESET Smart Security - Delivers protection against cybercrime, junk mail and hackers by adding a firewall and
antispam technology to ESET NOD32 Antivirus. Versions are available for Microsoft Windows, Linux, FreeBSD, and other platforms.
A NOD32 Enterprise Edition is available that consists of NOD32 AntiVirus and NOD32
Remote Administrator. The NOD32 Remote Administrator program allows a network administrator to monitor
anti-virus functions, push installations and upgrades to unprotected PCs on the network, and update configuration files from a central location.
Also see Wikipedia article.
ICSA Labs - Up-to-date and reliable information about computer viruses, worms, and other forms
of malicious code.
Internet Storm Center: Today's Diary - A global cooperative cyber threat / internet security
monitor and alert system. Featuring daily handler diaries with summarizing and analyzing new threats to networks and internet security events.
Norton Safe Web - If you are a Web site owner, Norton Safe Web can work with
you to provide a safe environment for Internet users. Its site report is a resource to help you identify and resolve security issues for users of
your Web site. To submit your site for rating, re-evaluation, or to appeal the rating of your site, you first need to create a Norton Safe Web account
and verify the ownership of your site.
SecureList - A computer security portal run by Kaspersky Lab devoted to educating the public about Internet security.
It hosts a Virus Encyclopedia which provides information about various types of computer malware.
Sophos - Anti-virus and anti-spam information for business. Software, 24/7 support, research.
StopBadware - A Neighborhood Watch campaign aimed at fighting badware.
Seeks to provide reliable, objective information about downloadable applications in order to help consumers to make better choices about what they
download on to their computers. Aiming to become a central clearinghouse for research on badware and the bad actors who spread it, and to become
a focal point for developing collaborative, community-minded approaches to stopping badware.
Symantec Security Response - Swift, global responses to computer virus threats,
proactively researching and developing technologies to eliminate such threats and educating the public on safe computing practices. Visit the Threats
Explorer page for latest threats or A-Z Threats page
for encyclopedia of viruses.
Symantec.cloud - Prevents email spam from reaching your network and improves employee productivity
by virtually eliminating the need to read and delete unsolicited messages.
TechHelpList - Linux, database, Xenserver systems admininistration tutorials; virus, malware, phishing, and spam alerts.
Bitdefender Safego - Anti-spam protection. Launched for Facebook users, Safego now
protects Twitter accounts as well.
Blacklist Check - This test will check a mail server IP address against
hundreds of DNS based email blacklists. (Commonly called Realtime blacklist, DNSBL or RBL). If your mail server has been blacklisted, some email you send
may not be delivered. Email blacklists are a common way of reducing spam. If you don't know your mail server's address, start with a MX
Composite Blocking List (CBL) - CBL takes its source data from very large spamtraps,
and only lists IPs exhibiting characteristics which are specific to open proxies of various sorts (HTTP, socks, AnalogX, wingate, etc.)
which have been abused to send spam, worms/viruses that do their own direct mail transmission, or some types of trojan-horse or
"stealth" spamware, without doing open proxy tests of any kind.
Death2Spam - Spam blocker based on a word-frequency distribution analyzer,
which rapidly compares the pattern of words detected in an incoming email message against a database of good and spam emails.
DNSBL Resource - All about blacklists. A DNSBL is a DNS (domain name service)-based spam blocking list. Some people call them blacklists, while others call them blocklists.
These blacklists are IP address-based. This means that they contain IP addresses, generally of email servers
that you might receive spam from, or that the blacklist maintainer has indeed received spam from. There are dozens of such lists available, all compiled
with different criteria, at every conceivable point in the sanity spectrum. Some lists work better than others, and some list maintainers are more
trustworthy and respectable than others.
Email Blacklist Check - This test will check a mail server IP address against 147 DNS based email blacklists. (Commonly called Realtime blacklist, DNSBL orRBL). If
your mail server has been blacklisted, some email you send may not be delivered. Email blacklists are a common way of reducing spam. If
you don't know your mail server's address, start with a MX Lookup.
FTC: Spam Email - Information about the Federal Trade Commission's
law enforcement actions against deceptive commercial email and spammers' responsibilities under the CAN-SPAM law. In the For Consumers section, you'll find tips on how to reduce the amount of spam email in your
GetNetWise - Kids' safety on Internet, spam, spyware, viruses, privacy.
Learning to Filter Unsolicited Commercail E-Mail (.pdf) -
From the authors: "We present a thorough investigation on using machine learning to construct effective personalized anti-spam filters. The investigation
includes four learning algorithms, Naive Bayes, Flexible Bayes, LogitBoost, and Support Vector Machines, and four datasets, constructed
from the mailboxes of different users. The article discusses the model and search biases of the learning algorithms, along with worst-case computational
complexity figures, and observe how the latter relate to experimental measurements. It studies how classification accuracy is affected when using
attributes that rep-resent sequences of tokens, as opposed to single tokens, and explore the effect of the size of the attribute and training set,
all within a cost-sensitive framework. Furthermore, it describes the architecture of a fully implemented learning-based anti-spam filter, and presents
an analysis of its behavior in real use over a period of seven months. Information is also provided on other available learning-based anti-spam filters,
and alternative filtering approaches.
MessageLabs - A leading provider of managed email security services to businesses worldwide.
Predictive technology scanning email and eliminating threats such as viruses, spam and other unwanted content.
Penny Black Project - Microsoft project investigating
techniques to reduce spam by making the sender pay. CPU cycles, memory cycles, and Turing tests (proof that a human was involved)
are the leading schemes.
PhishTank - Phishing is a fraudulent attempt, usually made through email, to steal your personal
information. PhishTank is a free community site where anyone can submit, verify, track and share phishing data.
Register of Known Spam Operations (ROKSO) - This database collates information and evidence
on known professional spam operations that have been terminated by a minimum of three ISPs for spam offenses. 80% of spam received by Internet
users in North America and Europe can be traced via aliases and addresses, redirects, hosting locations of sites and domains, to a hard-core group
of around 200 known spam operations ("spam gangs"), almost all of whom are listed in the ROKSO database. These spam operations consist of an estimated 500-600 professional spammers with ever-changing aliases
and domains. The vast majority of those listed here operate illegally and move from network to network (and country to country) seeking out "spam-friendlyISPs
known for lax enforcing of anti-spam policies. Also see the World's Worst Spammers.
Spam - Articles and resources on spam provided by Paul Graham.
Spam and Open Relay Blocking System (SORBS) - A controversial open proxy and open
mail relay DNSBL. It has been augmented with complementary lists that include various other classes of hosts, allowing for customized email
rejection by its users.
Spamhaus Project - Tracks the Internet's spammers, spam gangs and spam services, provides dependable
realtime anti-spam protection for Internet networks, and works with law enforcement to identify and pursue spammers worldwide. Also see Spamhaus
Top 10 Worst IPs.
Spamnation - Information about spam and other email abuses.
Symantec: State of Spam and Phishing - Symantec issues
a monthly State of Spam & Phishing Report summarizing the spam trends and email threats negatively impacting enterprises and consumers.
The report leverages security data from the Symantec Global Intelligence Network to keep you informed of email borne threats.
TechHelpList - Linux, database, Xenserver systems admininistration tutorials; virus, malware, phishing, and spam alerts.
UCEPROTECT - Frequently updated global blacklists free of charge.
URIBL - Realtime URI blacklist. URIBL lists domains
that appear in spam, not where they were sent from. Its lists are intended to be used with antispam software to help tag emails as spam. It does
Verizon Whitelist Request - If your organization is having difficulty delivering
e-mail to Verizon Online addresses, or if you are a subscriber to one of Verizon Online's Internet access services who is unable to receive
certain e-mails, fill out the appropriate form here and submit it to Verizon Online Security.
Anti-Spyware Coalition (ASC) - Dedicated to building a consensus about definitions
and best practices in the debate surrounding spyware and other potentially unwanted technologies.
CA Anti-Spyware - Spyware finds its way onto unsuspecting computers through various hidden methods.
Once infected, your PC can get bogged down by hidden processes, unwanted pop ups, web browser hijackers and many other symptoms, and your
personal information can be exposed. CA Anti-Spyware finds these pests, then quarantines them, so that your computer will work as expected.
Enigma Software Group (ESG) - ESG offers products made to meet PC users
' anti-malware and security needs. These products provide a range of security features from real-time protection against the latest online security
threats, custom-made fixes to remove aggressive malware, advanced technology in PC registry repair, and other aspects included to improve
malware detection/prevention effectiveness.
GetNetWise - Kids' safety on Internet, spam, spyware, viruses, privacy.
PC Spy Keylogger - Invisible and easy-to-use surveillance tool that records every keystroke
to a log file. The log file can be sent secretly with email or FTP to a specified receiver. PC Spy Keylogger can also detection
specified keywords and take a screenshot whenever one is typed, displaying findings in a tidy log viewer. It causes no suspicious slowdowns and takes
very few system resources. all this is happening in full stealth mode so the person you are monitoring will never be aware of it.
Rogue/Suspect Anti-Spyware Products and Web Sites - Database of
rogue and suspect anti-spyware products and web sites. Products listed on this page do not provide proven, reliable anti-spyware protection. Others
may use unfair, deceptive, high pressure sales tactics and false positives to scare up sales from gullible, confused users.
Security-in-a-Box - A guide to digital security for activists and human rights defenders throughout the world. Community Guides focus on specific groups of people - sometimes in specific regions - who face severe digital threats. Tool Guides offer step-by-step instructions to help you install and use the most essential digital security software and services. Also see Protect Your Device from Malware and Hackers.
Spector Pro - Internet and PC activity recorder. Spector records all web
sites visted, all keystrokes typed, all incoming and outgoing e-mails. As frequently as once per second, Spector secretly takes a snapshot
of your computer's screen, and allows for easy, VCR-like playback. With Spector, you see exactly what someone else was doing on
the Internet. eBlaster records all keystrokes typed, all web sites visited, and records both sides of AOL chat conversations, AOL instant
messages, and ICQ chat conversations. eBlaster then e-mails this recorded information to the e-mail address you specify, so that you know
what your wife, husband, children and employees are doing, even if you are thousands of miles away.
Spychecker - Global database of spyware programs. Enter the name and find out if it's spyware
or not."Spyware" makes periodic use of your Internet connection in the background. While legitimate adware companies will disclose the nature
of data that is collected and transmitted in their privacy statement (linked from our database), there is almost no way for the user to actually
control what data is being sent.
Spyware-Guide - Provides an updated resource on spy ware applications, what they do, and
how they're used.
Websense - Internet filtering, access blcoking and control, server based filtering
and other solutions to spam and spyware.
KWSnet is an Internet subject directory providing special attention to U.S. national and international news, the arts, computing, culture, environment, law, literature, media, politics, science
and technology. Based in San Francisco, California, KWSnet contains over 125,000 annotated links to resources worldwide. Use Search KWSnet, located at the top of each page, to search within this site. Use Ctrl-F (Windows) or ⌘-F (Mac) to search
within individual pages.
KWSnet's Twitter Account provides over 20 curated lists/groupings of Twitter accounts -- from Architecture to Travel -- to assist you in your social networking experience.nbsp;
KWSnet's Zotero Library provides news articles, primary and secondary sources, and bibliographic information for your research. More information on Zotero, a powerful, easy-to-use research tool, can be found at its site. Also recommended, subscribe to RSS content for the latest updates.
KWSnet is completely non-commercial. It has no commercial objective or emphasis. Instead, it is intended for educational purposes, research, and
personal use. It is updated regularly.
KWSnet is IPv6 enabled, HTTPS deployed, and fully HTML5 compliant.
KWSnet may be contacted via email with any comments, suggestions or link submissions. KWSnet is designed and maintained, in its entirety, by Kirk W. Smith.