Yahoo touts new spam protections

Powered by SC Magazine
 

Yahoo is touting a new set of tools it is using to block spam for its webmail service.

Yahoo is touting a new set of tools it is using to block spam for its webmail service.

Company anti-spam czar Mark Risher made a posting on Tuesday outlining some of the new protections that the company is putting into place.

"At Yahoo, we take spam seriously," wrote Risher.

"It's a huge challenge and the bad guys are always out there trying to make a buck with their scams, but we’re committed to helping keep you safer online."

Amongst the tools is a computing cluster which utilises the company's Hadoop distributed computing system.

The cluster consists of thousands of individual systems and is used to detect and filter out spam, according to Risher.

Risher also noted a number of projects the company is undertaking with outside firms.

Startup Abaca is working with the company on new behavior-analysis tools to block spam messages, while email specialist ReturnPath is being tapped for a new service designed to remove false positives within spam filters.

Redesigning and improving Yahoo's webmail operation has been one of the main focuses for the company's ongoing rebuilding efforts.

Early last year, then-chief executive Jerry Yang unveiled an updated mail service that was the centerpiece of a new web strategy.

In December, the company rolled out further changes to the service when it announced a plan to open Yahoo Mail up to third-party developers.

Copyright ©v3.co.uk


 
 
 
Top Stories
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 311

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 118

Vote