Forensics Journal - Stevenson University 2013 | Page 30
FORENSICS JOURNAL
“419 Nigerian Advanced Fee Fraud Scam Lifecycle.” .NExt Web
Security Services. .NExT Web Security, n.d. Web. 18 Oct. 2012.
http://www.nextwebsecurity.com/419LifeCycle.asp
Ropelato, Jerry. “Tricks Pornographers Play.” TopTenREVIEWS. Web.
1 May 2012. http://internet-filter-review.toptenreviews.com/trickspornographers-play.html
Garrett, Elena. “Visa and Tickets Dating Scam: First Things to
Know.” Russian Detective. Integrative Global Solutions, LLC, July
2011. Web. 18 Oct. 2012. http://www.russian-dating-scams.com/
scams/first_things_to_know.htm
Rubinstein, Maria. “Congratulations, you’ve won! The reality behind
online lotteries.” SecureList. 25 Jan. 2012. Web. 30 Apr. 2012.
http://www.securelist.com/en/analysis/204792215/Congratulations_
youve_won_The_reaity_behind_online_lotteries
Getting Into the Feedback Loop. Lyris HQ. Web. 15 Apr. 2012. http://
www.lyris.com/blog/793-Getting-Into-the-Feedback-Loop
Scareware scam warning. The Canadian Anti Fraud Centre. Web. 1
May 2012. http://www.antifraudcentre-centreantifraude.ca/english/
documents/Scareware.pdf
Gongol, Brian. “How to Recognize Phishing.” Online Image. 11
Mar. 2005. GONGOL.com. Web. 15 Apr. 2012. http://www.gongol.
com/howto/recognizephishing/
Sender ID Framework Overview: Verification System Aims to Reduce
Spam and Increase Safety Online. Microsoft. 17 Sep. 2007.