martinlum.com Martin Lum – Security Blog

martinlum.com
Title: Martin Lum – Security Blog
Keywords:
Description: Martin Lum – Security Blog Martin Lum – Security Blog Current Issues in IT Data Security Latest Ramblings Kids or corporations – who’s looking at your data? July 13th, 2011 | 3 Comments Once upon a t
martinlum.com is ranked 0 in the world (amongst the 40 million domains). A low-numbered rank means that this website gets lots of visitors. This site is relatively popular among users in the united states. It gets 50% of its traffic from the united states .This site is estimated to be worth $0. This site has a low Pagerank(0/10). It has 1 backlinks. martinlum.com has 43% seo score.

martinlum.com Information

Website / Domain: martinlum.com
Website IP Address: 184.168.137.128
Domain DNS Server: ns52.domaincontrol.com,ns51.domaincontrol.com

martinlum.com Rank

Alexa Rank: 0
Google Page Rank: 0/10 (Google Pagerank Has Been Closed)

martinlum.com Traffic & Earnings

Purchase/Sale Value: $0
Daily Revenue: $0
Monthly Revenue $0
Yearly Revenue: $0
Daily Unique Visitors 0
Monthly Unique Visitors: 0
Yearly Unique Visitors: 0

martinlum.com WebSite Httpheader

StatusCode 200
Content-Type text/html; charset=UTF-8
Date Tue, 16 Aug 2016 07:34:44 GMT
Server Apache

martinlum.com Keywords accounting

Keyword Count Percentage

martinlum.com Traffic Sources Chart

martinlum.com Similar Website

Domain Site Title

martinlum.com Alexa Rank History Chart

martinlum.com aleax

martinlum.com Html To Plain Text

Martin Lum – Security Blog Martin Lum – Security Blog Current Issues in IT Data Security Latest Ramblings Kids or corporations – who’s looking at your data? July 13th, 2011 | 3 Comments Once upon a time, conventional opinion was that major cyber-attacks required major resources, such as those available to foreign governments seeking to damage their targets. These opinions are out of step with today’s reality. Michael Chertoff, former DHS secretary, told attendees during keynote remarks at the 2011 Gartner Security & Risk Management Summit that in recent years he has seen technology evolve to the point where government resources aren’t needed to launch large-scale information security attacks. http://searchsecurity.techtarget.com/news/2240037100/Chertoff-warns-of-growing-information-security-attacks-from-small-cyberattack-groups?asrc=EM_NLN_14170536&track=NL-102&ad=838494USCA& Recent attacks have sometimes involved small groups or even teenagers, possibly acting alone, such as this 19-year old recently arrested in England as a suspect. http://www.cbsnews.com/stories/2011/06/21/scitech/main20072930.shtml Before you think this is only about teenagers, know that corporations get involved as well. The following case, (and here the corporation is not the victim but the alleged perpetrator), involves News Corporation ($32 billion in revenue) and its British tabloid News of the World. http://www.bbc.co.uk/news/uk-14070733 Apparently, the newspaper had for years made a habit of hacking the mobile phones of celebrities, politicians and crime victims to spice up the contents of its reporting. News Corp has basically admitted guilt by their decision to shut down the newspaper permanently. This still leaves the News International paper, also owned by News Corp. who specifically targeted the British Prime Minister: http://www.guardian.co.uk/media/2011/jul/11/phone-hacking-news-international-gordon-brown Hackers operate under a rather murky set of ethics and codes of conduct. Corporations practicing industrial espionage may believe that the end justifies the means. Individual hackers may see themselves in a “Robin Hood” role, but who their beneficiaries are is difficult to say. Sometimes they like to be viewed as performing a valuable service, such as this group warning of a weakness in Apple’s developer website. Hard to say if this will help Apple more than it would help others immediately exploit the weakness: http://arstechnica.com/apple/news/2011/06/hacker-group-says-apple-developer-site-susceptible-to-phishing-hacks.ars Obviously there is no more room for complacency in today’s security world. Information piracy has evolved to a new level and become accessible to many more participants. Experts are increasingly saying that many recent high-profile breaches have not even involved any advanced or groundbreaking techniques. And now you don’t know whether to be on the lookout for a teenage intruder, or a corporation with substantial resources, who is testing the defenses of your networks. Security administrators have to similarly step up their game. Share this: Email Facebook Reddit Digg Print StumbleUpon Tags: Apple, DHS, Gartner, News Corp No battle plan survives first contact with the enemy July 1st, 2011 | No Comments Tags: IMF, LulzSec, RSA, SQL injection RSA Replacements a Token Gesture? June 16th, 2011 | 3 Comments Tags: Bank of America, Codes, EMC, Lockheed Martin, Passwords, RSA, SAP, SecurID, Tokens Hackers or Insiders – which is it? June 6th, 2011 | 2 Comments Tags: biometric, breach, security, Sony, two-factor Park your data in this cloud your own risk! May 24th, 2011 | No Comments Tags: Amazon, EBS, EC2, Epsilon, RSA, SecurID, Sony Sony’s Virtual Battle May 3rd, 2011 | 1 Comment Tags: Credit report, data breach, Epsilon, Identity Theft, PlayStation, security, SOE, Sony Epsilon Data Breach Ripples April 22nd, 2011 | 10 Comments Tags: data breach, Epsilon, NIST, PII Former Gucci employee turns Trojan Horse April 7th, 2011 | No Comments Tags: fake identity, Gucci, Trojan Horse, USB token Draft of FIPS 201-2 includes biometrics March 18th, 2011 | No Comments Tags: FIPS, NIST, PIV, PKI, smart card Twitter offers HTTPS setting for improved security March 16th, 2011 | No Comments Tags: HTTPS, tweet, TweetDeck, Twitter, WIFI NEC implemented biometric voter registration for Bolivian election March 15th, 2011 | No Comments Tags: biometrics, Bolivia, election, NEC About This Site What do these battleships have to do with cyber security? The large, cumbersome ships are being successfully attacked by smaller, faster boats, just like corporate enterprise systems are being raided by cyber pirates. Categories Select Category All Biometrics Cyber-attacks Security Archives July 2011 (2) June 2011 (2) May 2011 (2) April 2011 (2) March 2011 (4) Calendar August 2016 M T W T F S S ? Jul 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Search Follow me on TwitterFollow @ML7007 About Me Martin Lum is an IT professional, specializing in biometric identity management and fraud mitigation software for SAP? systems, based in the NYC area. Meta Log in Entries RSS Comments RSS WordPress.org Blogroll Documentation Plugins Suggest Ideas Support Forum Themes WordPress Blog WordPress Planet ? 2016 Martin Lum – Security Blog | powered by WordPress | Theme by refueled Entries RSS | Comments RSS | Log in TweetBottom by iMod Send to Email Address Your Name Your Email Address Cancel Post was not sent - check your email addresses! Email check failed, please try again Sorry, your blog cannot share posts by email.

martinlum.com Whois

Domain Name: MARTINLUM.COM
Registrar URL: http://www.godaddy.com
Registrant Name: Martin Lum
Registrant Organization:
Name Server: NS52.DOMAINCONTROL.COM
Name Server: NS51.DOMAINCONTROL.COM
DNSSEC: unsigned
For complete domain details go to:
http://who.godaddy.com/whoischeck.aspx?domain=MARTINLUM.COM
The data contained in GoDaddy.com, LLC's WhoIs database,
while believed by the company to be reliable, is provided "as is"
with no guarantee or warranties regarding its accuracy. This
information is provided for the sole purpose of assisting you
in obtaining information about domain name registration records.
Any use of this data for any other purpose is expressly forbidden without the prior written
permission of GoDaddy.com, LLC. By submitting an inquiry,
you agree to these terms of usage and limitations of warranty. In particular,
you agree not to use this data to allow, enable, or otherwise make possible,
dissemination or collection of this data, in part or in its entirety, for any
purpose, such as the transmission of unsolicited advertising and
and solicitations of any kind, including spam. You further agree
not to use this data to enable high volume, automated or robotic electronic
processes designed to collect or compile this data for any purpose,
including mining this data for your own personal or commercial purposes.
Please note: the registrant of the domain name is specified
in the "registrant" section. In most cases, GoDaddy.com, LLC
is not the registrant of domain names listed in this database