Forensics Journal - Stevenson University 2013 | Page 30

FORENSICS JOURNAL “419 Nigerian Advanced Fee Fraud Scam Lifecycle.” .NExt Web Security Services. .NExT Web Security, n.d. Web. 18 Oct. 2012. http://www.nextwebsecurity.com/419LifeCycle.asp Ropelato, Jerry. “Tricks Pornographers Play.” TopTenREVIEWS. Web. 1 May 2012. http://internet-filter-review.toptenreviews.com/trickspornographers-play.html Garrett, Elena. “Visa and Tickets Dating Scam: First Things to Know.” Russian Detective. Integrative Global Solutions, LLC, July 2011. Web. 18 Oct. 2012. http://www.russian-dating-scams.com/ scams/first_things_to_know.htm Rubinstein, Maria. “Congratulations, you’ve won! The reality behind online lotteries.” SecureList. 25 Jan. 2012. Web. 30 Apr. 2012. http://www.securelist.com/en/analysis/204792215/Congratulations_ youve_won_The_reaity_behind_online_lotteries Getting Into the Feedback Loop. Lyris HQ. Web. 15 Apr. 2012. http:// www.lyris.com/blog/793-Getting-Into-the-Feedback-Loop Scareware scam warning. The Canadian Anti Fraud Centre. Web. 1 May 2012. http://www.antifraudcentre-centreantifraude.ca/english/ documents/Scareware.pdf Gongol, Brian. “How to Recognize Phishing.” Online Image. 11 Mar. 2005. GONGOL.com. Web. 15 Apr. 2012. http://www.gongol. com/howto/recognizephishing/ Sender ID Framework Overview: Verification System Aims to Reduce Spam and Increase Safety Online. Microsoft. 17 Sep. 2007.