TechCrunch | The genetic analysis and family tree website MyHeritage was breached last year by unknown actors, who exfiltrated the emails and hashed passwords of all 92 million registered users of the site. No credit card info, nor (what would be more disturbing) genetic data appears to have been collected. The company announced the breach on its blog, explaining that an unnamed security researcher contacted them to warn them of a file he had encountered “on a private server,” tellingly entitled “myheritage.” Inside it were the millions of emails and hashed passwords.
TechCrunch | At Intel’s Computex keynote yesterday in Taipei, Taiwan, Intel’s client computing head Gregory Bryant revealed that later this year, the company will unveil a single-socket processor with a whopping 28-cores that will run at 5 GHz. In comparison, AMD’s Threadripper processor, one of Intel’s closest competitors, has 16-cores and 32 threads. Bryant said the new chip will debut in the fourth quarter of this year but did not reveal pricing details.
The Verge | It’s official. Microsoft is acquiring GitHub for a hefty $7.5 billion price tag — and the millions of developers who use the site have some feelings about it. Commentators across the tech blogosphere and the burgeoning dev communities across Twitter and Reddit have come out for and against the acquisition, and because this is the internet, there have also been plenty of memes.
TechRepublic | Apple is beefing up efforts to protect their users from being tracked and hacked. Here's how.
How-To Geek | Google does this thing where it uses bad names for products. Then it re-uses those names for other products, confusing everyone. Such is the case for Smart Lock, which is technically three different things, depending on whether you’re talking about Android, Chromebooks, or passwords. Two of them are for device security, but the other is for passwords. It really just…doesn’t make a lot of sense. Here’s a close look at each one.
Lifehacker | Here’s a productivity tip managers and workers would do well to incorporate into their everyday email routine, courtesy of comedian and author Franchesca Ramsey from her days working at Upworthy: summarize lengthy emails up top so your recipients know what they’re in for. “We’d always start long emails with a little summary at the top so you’d know if you needed to read the whole email," she said. It’s also a communication technique used by the military, where it’s known as a BLUF (bottom line up front).
CIO | Leading change in an organization requires a balance of hard and soft skills. These 10 change management courses will help you strengthen the skillset necessary to lead organizational change.
Computerworld | Microsoft's latest entry in the crowded group messaging market continues to evolve. Here's how Microsoft Teams affects Skype for Business and what you need to know to evaluate it against its rivals.
SAASupdate
Several People Are Typing | If you’re planning to book some time off for a well-earned vacation or you suddenly need to look into the finer details of your last pay stub, you’ll likely want to get on those things right away. Good news: Now with the new ADP Virtual Assistant app, you can get that information sent to you where you’re already working — in Slack. There’s no need to switch tabs, switch tools, or switch contexts. Everything you need can be conjured up by typing “help” or using simple slash commands. Here’s how the new ADP app works.
Atlassian Blog | Atlassian is excited to announce the general availability of Atlassian Access. Atlassian Access is a set of capabilities that gives administrators company-wide visibility, control, and security over their Atlassian Cloud products, while providing users easy access to the collaborative tools they rely on to get work done. Atlassian Access comes equipped with SAML single sign-on, enforced two-step verification, password policies, and Priority Support.
Microsoft 365 Blog | The built-in suite of powerful threat protection services for Office 365—including Exchange Online Protection (EOP), Advanced Threat Protection (ATP), and Threat Intelligence—is a paramount requirement for customers choosing Office 365 to help drive their digital transformation. With InfoSecurity Europe kicking off, Microsoft is providing an update on how these security workloads provide enhanced protection for their customers and meet the strict data residency, compliance, and privacy requirements of Office 365.
Twitter   FaceBook   LinkedIn   Google+