Abuse.com
Resource guides and bulletins for combating Internet-related abuse
Adventures of an Open Proxy Server
Security whitepaper discussing proxy honeypots and observations on the types of abuse that are aided and enabled by insecure proxy servers.
Composing a Useful Abuse Report
What to include, what to omit, and who to send it to.
Cyber Law Enforcement
A network of law enforcement officers who specialize in cybercrime investigation and training. Cover child pornography, cyberstalking, cyberscams and fraud online.
eWEEK.com's Special Report on Cyber-Crime
Articles on cyber-crime, scams and security breaches.
Help! I have been blacklisted!
Provides recommendations for administrators who have found their networks or servers publicly or privately "blacklisted" for alleged abuse.
Net Abuse FAQ Index
A collection of Frequently Asked Questions related to net abuse, including spamming and e-mail scams.
Network Abuse Clearinghouse
A database of addresses for reporting Internet abuse.
NewsFactor: Fighting Internet Abuse: Things You Can Do
Brief introduction to basic techniques for tracing, reporting, and protecting against internet abuse.
Pirated Sites
A portal for sites pilfered, plundered and otherwise not original. Working to stop the theft of design and code.
ScamBusters
Monthly e-zine about recognizing, preventing and fighting all types of fraud, misinformation and abuse perpetuated with the help of the internet.
Webguardian
A nonprofit Internet watchdog, providing protection and advice for consumers and reducing Internet crime and fraud.
www.cyberbullying.ca
Information about and resources to stop harassment by computer.
The Role of Insecured Proxies in Internet Abuse
Paper from a presentation discussing the role of insecure proxies in various forms of internet abuse, including spam, denial of service, fraud, and cracking. [PDF] (September, 2003)
Abuse.com
Resource guides and bulletins for combating Internet-related abuse
Adventures of an Open Proxy Server
Security whitepaper discussing proxy honeypots and observations on the types of abuse that are aided and enabled by insecure proxy servers.
Composing a Useful Abuse Report
What to include, what to omit, and who to send it to.
Cyber Law Enforcement
A network of law enforcement officers who specialize in cybercrime investigation and training. Cover child pornography, cyberstalking, cyberscams and fraud online.
eWEEK.com's Special Report on Cyber-Crime
Articles on cyber-crime, scams and security breaches.
Help! I have been blacklisted!
Provides recommendations for administrators who have found their networks or servers publicly or privately "blacklisted" for alleged abuse.
Results: 1 2 3 4 Next