background preloader

Join the fight against phishing

Join the fight against phishing

http://www.phishtank.com/

Related:  Cyber Security ToolsOutils de sécurité

Internet Traffic Archive The Internet Traffic Archive is a moderated repository to support widespread access to traces of Internet network traffic, sponsored by ACM SIGCOMM. The traces can be used to study network dynamics, usage characteristics, and growth patterns, as well as providing the grist for trace-driven simulations. The archive is also open to programs for reducing raw trace data to more manageable forms, for generating synthetic traces, and for analyzing traces. Traces contributed to the archive have no restrictions as to what use may be made of them (except for traffic analysis as noted below). Traces may however have restrictions on redistribution.

Blacklist Check Blacklist Check Right here and now you can check to see if your IP address is listed on an anti-spam database. Will your emails or forum chats get blocked? Below is a list of the major databases that track blacklisted IP addresses — look at the list now and you'll see there are no checkmarks next to the database names. Reverse IP Lookup - Find Other Web Sites Hosted on a Web Server Find other sites hosted on a web server by entering a domain or IP address above. Note: For those of you interested, as of May 2014, my database has grown to over 100 million domain names. I am now offering this domain list for purchase.

Website/URL/Link Scanner Safety Check for Phishing, Malware, Viruses [results: leelightingfortmyers.com] - ScanURL.net This service helps inform you of potentially suspicious , scammy, or dangerous web pages, to help you browse the web more safely. Definitions : Phishing is a forgery/imitation of another website, designed to trick people into sharing personal or financial information, possibly resulting in identity theft or other abuse. Malware is malicious code downloaded to your machine without your consent, harming your computer. We don't scan URLs/links/websites ourselves. Instead we rely on reputable 3rd-party web services to do it for us. Nobody's perfect, so please be aware that their information may not always be accurate or current.

Redleg's File Viewer If you have problems identifying the issue don't sit there and struggle with it for days/weeks. Go over to the Stopbadware Forum and ask for some assistance. Notes: 1. Google has 2 very different types of flagging of a "compromised" site -- A. If the site is "compromised" with malicious content access to the site will be blocked in your browser, you will get a malware ahead warning instead, and there will be a This site may harm your computer below your links in search results.

The 10 Tools of Online Oppressors - Reports SAN FRANCISCO In reporting news from the world’s most troubled nations, journalists have made a seismic shift this year in their reliance on the Internet and other digital tools. Blogging, video sharing, text messaging, and live-streaming from cellphones brought images of popular unrest from the central square of Cairo and the main boulevard of Tunis to the rest of the world. In Other Languages • Español • Português • Français • Русский • العربية • Multimedia • Audio Report: Offenders and TacticsIn Print • Download the pdfMore on This Issue • CPJ Internet Channel: Danny O'Brien's blog • Blogging in Egypt: Virtual network, virtual oppression • Burmese exile news site endures hacking, DDoS attacks

Unwelcome Domains Mail from the following 2410 domains is not welcome at Rhyolite Software. as of Thu Jan 30 20:58:37 UTC 2014, because of objectionable mail supposedly from, about, or otherwise associated with them and sent to mailboxes for which I'm responsible. The objectionable quality of the mail is often but not always that it is unsolicited bulk email or spam. Legal threats are also objectionable. Mail from some domains is unwelcome because the owners of those domains appear to be aiding senders of objectionable mail with services such as DNS. All suggestions for additions to this list from people who are not users of Rhyolite Software mailboxes are ignored. This policy has much to recommend it starting with its utility as a defense against legal threats by spammers.

Request a malware review - Webmaster Tools Help File a reconsideration request instead if your site has been removed from the Google index, or no longer performs as well as it did, but has no security violations. If your site is flagged as containing malware or unwanted software, you can request a malware or unwanted software review. Prepare for your review You must first take action on your own site before requesting a review. Make sure your site is free from any infected code and content. See What is malware for more details. A Zero-Day Virus Attack Earlier this month a part of our University was hit with a zero-day virus attack. I had not heard of the phrase zero-day before now and suspect most people only learn about the concept when one occurs at their place of work. Zero-day refers to a class of computer threats that exposes undisclosed or unpatched application vulnerabilities.

Webmasters help for hacked sites – Google Every day, cybercriminals compromise thousands of websites. Hacks are often invisible to users, yet remain harmful to anyone viewing the page — including the site owner. For example, unbeknownst to the site owner, the hacker may have infected their site with harmful code which in turn can record keystrokes on visitors’ computers, stealing login credentials for online banking or financial transactions. In this first step, we explain how and why hacks happen, and review options for recovery. Step 1: Watch the overview

Removing Content From Google - Legal Help Removing Content From Google This page will help you get to the right place to report content that you would like removed from Google's services under applicable laws. Providing us with complete information will help us investigate your inquiry. If you have non-legal issues that concern Google's Terms of Service or Product Policies, please visit

Related: