internetthreats



=Internet Threats=

General Information Malware (including viruses, worms, and Trojan horses) Spam Spyware & Adware Phishing, Hoaxes & Other Scams Other Threats

Also see Internet Basics, Internet Safety

GENERAL INFORMATION
How to Report an Email or Web Scam http://www.fightidentitytheft.com/how-to-report-scams.html Great site! There is a lot of information on this topic as well as the steps you should take when you get a scam email or you are the victim of a scam.

Latest Email Hoaxes - Current Internet Scams (Hoax-Slayer) http://www.hoax-slayer.com/ “Hoax-Slayer is dedicated to debunking email hoaxes, thwarting Internet scammers, combating spam, and educating web users about email and Internet security issues.”

Educator's Guide to Computer Crime and Technology Misuse (2002 Addendum) http://www.ed.uiuc.edu/wp/crime-2002/computercrime.htm

Threat Explorer http://www.symantec.com/business/security_response/threatexplorer/risks/index.jsp This is a “comprehensive resource for daily, accurate and up-to-date information on the latest threats, risks and vulnerabilities.” You can select specific lists for categories such as spyware, adware, hoaxes, etc.

Internet Fraud Prevention http://www.symantec.com/norton/products/library/article.jsp?aid=internet_fraud_prevention

Vulnerabilities http://www.symantec.com/norton/security_response/vulnerabilities.jsp

Symantec Security Response http://www.symantec.com/security_response/index.jsp “Choose one of the two tailored Symantec site offerings that best meets your needs:” - Home Users http://www.symantec.com/norton/security_response/index.jsp - IT Professionals http://www.symantec.com/business/security_response/index.jsp

Computer Fraud [|http://www.windowsusers.org/scams.html] Nice, concise description of many threats and suggestions for avoiding them by a pocide officer, Andy Querry.

New E-Scams and Warnings http://www.fbi.gov/cyberinvest/escams.htm This is from the Cyber Investigations program of the Federal Bureau of Investigation (FBI.)

Nigerian Fraud Email Gallery http://potifos.com/fraud/ 542 different examples

Computer Fraud http://www.ed.uiuc.edu/wp/crime-2002/fraud.htm This is part of the Educator's Guide to Computer Crime and Technology Misuse.

Tips to Prevent Computer Fraud https://www.pnc.com/webapp/unsec/ProductsAndService.do?siteArea=/PNC/PNC+Security+Center/How+to+Prevent+Fraud/Tips+to+Prevent+Computer+Fraud

General Security http://www.ed.uiuc.edu/wp/crime-2002/general.htm This is part of the Educator's Guide to Computer Crime and Technology Misuse.

What is Computer Fraud? http://www.wisegeek.com/what-is-computer-fraud.htm This is part of the Educator's Guide to Computer Crime and Technology Misuse.

Computer Hacking http://www.ed.uiuc.edu/wp/crime-2002/hacking.htm This is part of the Educator's Guide to Computer Crime and Technology Misuse.

Online Harassment http://www.ed.uiuc.edu/wp/crime-2002/harassment.htm This is part of the Educator's Guide to Computer Crime and Technology Misuse.

Now That Your Download is Complete, Make Sure Your Computer is Safe http://www.download.com/3055-2194_4-10855899.html?tag=pdl-redir

MALWARE
Malware http://www.symantec.com/norton/security_response/malware.jsp

What is the difference between viruses, worms, and Trojans? http://service1.symantec.com/SUPPORT/nav.nsf/0/024c927836400f528825675100593eb2?OpenDocument&seg=hm&lg=en&ct=us

Computer Virus Index http://www.faqs.org/faqs/computer-virus/


 * SPAM **

Spam http://www.symantec.com/norton/security_response/spam.jsp

Anti-spam techniques (e-mail) [Wikipedia] http://en.wikipedia.org/wiki/Anti-spam_techniques_%28e-mail%29

Study shows how spammers cash in http://news.bbc.co.uk/2/hi/technology/7719281.stm “Spammers are turning a profit despite only getting one response for every 12.5m e-mails they send, finds a study.”

FAQ: How do spammers get people's email addresses? http://www.faqs.org/faqs/net-abuse-faq/harvest/

Spyware http://www.symantec.com/norton/security_response/spyware.jsp

Controlling Spyware and Adware http://www.symantec.com/norton/products/library/article.jsp?aid=control_spyware

Phishing http://www.symantec.com/norton/security_response/phishing.jsp

Hoax Busters http://hoaxbusters.ciac.org/

Scam Busters [|http://www.scambusters.org] “Internet Scams, Identity Theft, and Urban Legends”

Child Pornography on the Internet http://www.ed.uiuc.edu/wp/crime-2002/child.htm This is part of the Educator's Guide to Computer Crime and Technology Misuse.

Pedophilia on the Internet http://www.ed.uiuc.edu/wp/crime-2002/pedo.htm This is part of the Educator's Guide to Computer Crime and Technology Misuse