article thumbnail

RSA 2009: Symantec and MessageLabs Talk About the State of Security

Tech Soup

Being able to use a heuristic method and reputation-based scanning in addition to threat signatures allows for more robust surveillance and response. They have seen how instead of payloads delivered as attachments in email, users are now engineered to click on links from spam.

Spam 43
article thumbnail

Women Who Tech Telesummit: Tools Galore Panel

Amy Sample Ward

spam filters: are you using spam-like words in any of your content? Laura: Social media is a big umbrella term that includes blogs, social networks, other online methods by which people pass your message online from person to person. Things to consider and target include: sender line: who is your email “from&#.

Tools 100
article thumbnail

Tools Galore in Online Communications - Online Fundraising, Advocacy, and Social Media - frogloop

Care2

spam filters: are you using spam-like words in any of your content? Laura: Social media is a big umbrella term that includes blogs, social networks, other online methods by which people pass your message online from person to person. May 15, 2009 | Anne Dougherty Copyright © 2008, Care2.com All rights reserved.