Live examples of malicious sites, how they work, and what little we currently know about the criminals who operate them. By Richard Clayton