AMD’s former Radeon Technology Group Chief, Raja Koduri, has had an eventful week. After Hexus recently reported on an internal memo Koduri sent to his staff announcing his departure from AMD, Intel recently sent out a press release announcing that Koduri has joined Intel’s newly formed Core and Visual Computing Group.
Back in September, Koduri announced that he’d be going on a sabbatical for personal reasons. In an email, he explained to his staff that he was taking a temporary break to spend some time with his family. Given that Koduri had just overseen AMD’s launch their latest Vega GPU, it didn’t seem like a huge deal at the time. [...]
Oath Inc, a subsidiary of Verizon which now owns Yahoo, revealed in an announcement earlier in the week that all of its users may have been affected in the 2013 data breach. This expands the number of affected accounts from the previously estimated one billion to three billion. An email has been sent to all Yahoo account holders who’s accounts were compromised during the hack.
Breached information include personal identifiable information including the name of the account holder, email address, encrypted passwords (not plain passwords), birthdays, and encrypted or unencrypted security questions and answers. Oath assures its users that no banking and credit [...]
Raja Koduri, head of AMD’s Radeon Technology Group (RTG), has recently revealed that he will be going on a sabbatical starting September 25 until December.
According to a recent article at PC Perspective, employees of RTG received the following email:
You haven’t heard from me collectively in a while – a symptom not only of the whirlwind of launching Vega, but simply of the huge number of demands on my time since the formation of RTG. Looking back over this short period, it is an impressive view. We have delivered 6 straight quarters of double-digit growth in graphics, culminating in the launch of Vega and being back in [...]
If you own a modern Android smartphone, have Allo Messenger, or a Google Home device, one of the most awesome features about it is its ability to respond to voice commands by simply saying “OK Google”. While initially OK Google voice commands felt a bit gimmicky rather than useful, numerous rounds of improvements along with improved voice recognition have made it very useful for doing simple things like calling someone while driving or sending a quick text message from across the room.
Unfortunately, Google doesn’t provide a full list of OK Google commands, but we’ve gone ahead and compiled a list of the most useful OK Google commands [...]
Really want that “free” e-book that’s locked behind an e-mail membership wall, but you know that it’s probably going to shove trash-mail down your throat until you vomit from seeing SPAM? Or how about really wanting to reply to that Cragslist ad about you know what, but don’t want the FBI knocking on your door?
To avoid cluttering your inbox with spam promos, nefarious phishing emails, or endangering your online security, just simply use a temporary, or disposable, email!
It’s easy. Today we’re going to show you how to use one of our favorite services, Temp Mail.
Using a Temporary Email Service Temp [...]
Guests who’ve stayed at Trump Hotels recently may want to keep a close eye on their credit card statements as the hotel chain recently disclosed a seven-month long security breach that exposed credit card and personal information of guests at 14 of their properties.
According to the notice posted on the Trump Hotels website, the security breach targeted Trump Hotel’s reservation booking provider, Sabre Hospitality Solutions and occurred between August 10, 2016 and March 9, 2017. The attack targeted 14 Trump properties which include popular hotels such as Trump DC, Trump Chicago, Trump Waikiki and Trump Las Vegas. A full list of affected hotels is [...]
Microsoft Outlook is arguably the most popular email client on the planet. From corporations to schools, its reach is far and wide. Since it’s likely that you already use it to some degree, we’ve compiled eight of the best, must know tips and tricks for you to make you workflow more efficient.
UI Tips Enable dark mode
If you want to save some eyestrain by reducing white backgrounds, Outlook can help with its Dark Gray theme.
1. From the main page, hit “File”, then “Options”.
2. Under the “General” tab, change Office Theme to “Dark Gray” and voila! Your monitor is no longer a [...]
Ever had your mom complain about trying to send you some holiday vacation photos that were 25MB too big for Gmail to accept? Yep. Been there, done that.
To ensure holiday vacation photos and other attachments under 50MB reaches their destination, Google is officially increasing the receive limit on Gmail to up to 50MB from its previous limit of 25MB. According to the announcement, the change will apply to all end users within the next 1-3 days.
That said, if you’re a Gmail user, don’t think you can start getting away with attaching 50MB files. Let’s not get too crazy here. While you can receive the larger attachments just fine, if you want [...]
Razer recently sent out a warning to its users in regards to fake e-mails containing malware disguised as a fake sponsorship email from Razer.
The fake e-mail offers an invalid sponsorship from Razer. Upon clicking the link provided in the e-mail, the link will redirect its victim to a malware application.
One tell-tale sign of a fake e-mail is that it comes from a Gmail account instead of an official Razer e-mail account. The e-mail is also riddled with grammatical and spelling errors.
Razer stresses that it does not send out sponsorship deals via e-mail. Streamers who are interested in applying for Razer’s sponsorship program can sign up at [...]
Check your Windows Updates as Microsoft has just released a new patch for the notoriously insecure Adobe Flash player running on the equally notoriously insecure Internet Explorer and Microsoft Edge.
According to the patch notes, an attacker could execute malicious code on a exploited system by directing users to a specially crafted website designed to exploit the vulnerabilities.
In a web-based attack scenario where the user is using Internet Explorer for the desktop, an attacker could host a specially crafted website that is designed to exploit any of these vulnerabilities through Internet Explorer and then convince a user to view the website. An attacker [...]