Video Screencast Help


Member Profile

Status: -
Job Title: Senior Analyst

Martin Lee was born in Cambridge, UK in 1969. He is currently a senior analyst at researching the threat environment. CISSP certified and a Chartered Engineer, Martin started his career researching human viruses at the University of Oxford before switching focus to network security. When not giving presentations on behalf of Symantec he spends much of his time counting malware and trying to spot patterns in the activities of malware writers and distributors.
In his spare time, he enjoys combining digital photography with Victorian chemical processes and exhibiting his hand made prints.

Member for: 4 years 1 week
Contribution Stats
Forum Threads
Blog Entries
Group Joined

MartinLee's Activity

New blog entry 27 Sep 2012
The analogy between computer viruses and biological viruses is well developed. Computer viruses spread across the world and within organisations in ways that are consistent with models developed to understand and predict the spread of biological diseases in epidemics. However, viruses ...
New blog entry 31 Jan 2012
Managing the continued increase in data is a major issue for organisations. IDC predicts that we stored 1.8 zetabytes of information in 2011 (1.8 x 1021 bytes), and that this will increase to 7.9 zetabytes  stored by 2015 [1].
New blog entry 23 Jan 2012
Successful attacks against high profile large companies tend to make the news, however small to medium sized businesses (SMBs) are not immune to being sent targeted attacks. Many SMBs are at the forefront of innovation and as such present an enticing target for sophisticated attackers. ...
New blog entry 06 Oct 2011
The advanced persistent threat (APT) is one of the most difficult challenges faced by the anti-virus community. These highly sophisticated, low copy number targeted attacks are distinguishable from the large volume of high copy number malware sent over email, but remain tricky to ...
New blog entry 20 Jul 2011
Targeted attacks are sophisticated bespoke pieces of malware written with a specific purpose in mind. They are sent by email to recipients that have been researched by attackers and have been identified as having access to data or systems to which the attacker wishes to gain access. Such ...
New blog entry 04 Jul 2011
A journalist posed the question – “Now that Lulzsec has exposed all these companies as having vulnerabilities, will this mean that criminals will increase their hacking activity.” I think the issue here is that Lulzsec are just one of many gangs undertaking hacking ...
New blog entry 29 Jun 2011
The high water mark for spam was reached in July 2010 when approximately 230 billion spam messages were in circulation each day, accounting for 90% of all email traffic. This has now declined to 39.2 billion messages per day, accounting for only 72.9% of all email. The question is ...
New blog entry 28 Jun 2011
The recent drop in the amount of spam in circulation has had dramatic effects of email volumes. The percentage of all email that compromises spam has dropped from approximately 90% last summer to approximately 75% this summer. This 15% point drop in the spam rate corresponds to big changes in ...
New blog entry 24 Jun 2011
I was asked a few weeks ago how I keep my children safe online and started thinking about this in detail. Parental control software for internet access certainly have their place, but to my mind its the equivalent of hiring a robot as a nanny. It might help with some of the more ...
New blog entry 23 Jun 2011
I was encouraged today to read a report that found: “most IT admins, managers, and C-level executives consider Stuxnet, Operation Aurora, and other high-profile targeted threats 'minor' concerns … the typical business spends more time worrying about more mundane ...