Wikipedia Definition & Overview – Phishing
Phishing is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
Wikipedia Definition & Overview – Spam (electronic)
Spam is the use of electronic messaging systems to send unsolicited bulk messages, especially advertising, indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social networking spam, social spam, television advertising and file sharing network spam.
Anti-Phishing Working Group
The Anti-Phishing Working Group (APWG) is a non-profit global pan-industrial and law enforcement association focused on eliminating the fraud, crime and identity theft that result from phishing,pharming, malware and email spoofing of all types.
CAN-SPAM Act: A Compliance Guide for Business
The CAN-SPAM Act, a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have you stop emailing them, and spells out tough penalties for violations.
Central Europe phishing news
A website that provides the latest news and reports on phishing in Central Europe.
Coalition Against Unsolicited Commercial E-mail
This is a web site by volunteers to prevent spam. CAUCE stands for Coalition Against Unsolicited Commercial E-mail. CAUCE, is an ad hoc, all volunteer organization, created by Netizens to advocate for a legislative solution to the problem of spam. This site is designed to provide information about the problems of junk e-mail, some proposed solutions, and to provide resources for the Net Community to make informed choices about the issues surrounding
An article in the NewYorker magazine discusses the menace and the need for policing on electronic spam.
Federal Trade Commission: Spam
Introduction to Spam.
Fighting Back Against Identity Theft – Federal Trade Commission
The identity theft center of the FTC.
Fight Spam on the Internet!
This is a web-site that provides resources to computer users on how to fight spam on Internet. Also provides News, advice and advocacy information for the fight against unsolicited e-mails. This web site list and answer all and every question you may have on Spam.
FTC Consumer alert: How not to get hooked
Federal Trade commission suggests tips to help you avoid getting hooked by a phishing scam.
How Spam Works
Introduction to how spam works, how spammers get addresses, the big spamming companies, how to stop spam, and related articles.
How To Recognize Phishing Email Messages, Links, Or Phone Calls
Technical descriptions of the process, both in terms of how the attacks are carried out, and how a defense against phishing is oriented.
General Phishing Information and Prevention Tips.
Recognize phishing scams and fraudulent e-mails
Microsofts provided information about phishing, as well as any protections offered by their products.
Researcher: Iphone’s Safari allows phishing
Researcher Nitesh Dhanjani discloses how the iPhone allows phishing sites to evade important browser protections.
This site advises using best practices and tricks to curb and eliminate spam and also says how to complain about spam.
Spam & Phishing – Securelist
This website contains both basic knowledge and analysis about spam and phishing.
Spam Filters and Outlook Rules: Friends or Enemies?
Spam reader article on the how outlook rules and spam filters do not work together in Microsoft and often create inbox confusion forcing users to choose between the two.
Spamhaus tracks the Internet’s Spammers, Spam Gangs and Spam Services, and here it publishes the list of the 10 worst Spam service ISPs.
United States, European Union, and other countries’ laws and pending legislation regarding unsolicited commercial e-mail.
US-CERT Current Activity
Many phishing attacks use current events to target potential victims, such as the recent swine flu scare prompting messages referencing the event.
Video: Black Hat 2012 – Phishing and social engineering penetration testing
Some of the most high-profile data breaches started with a standard spear phishing attack, leaving some experts to advocate for more hardened technical defenses, but Rohyt Belani, CEO and co-founder of PhishMe Inc., believes user awareness training should be part of nearly every enterprise information security program.
Video: Cloudmark World Spam Video
Wonder where e-mail spam comes from? Cloudmark, a computer security firm, has made a video showing the world’s hottest spots for spammers over the past couple of years.
Video: Twitter hit by amazing weight loss spam attack
Has your Twitter account been spewing out messages about an amazing weight loss product?
Warning: Ramadan-themed phishing targets Muslim Internet users
As Muslims continue to observe the holy month of Ramadan, cybercriminals are exploiting the occasion to mount a Ramadan-themed phishing attack.
Zeus Overtakes Phishing in Threat Survey
Zeus-style malware now beats out password phishing for the dubious honor of “the greatest threat to online banking today.”