TheRegister
Britains's AI gold rush hits a wall: not enough electricity
Energy is essential for delivering the UK governments' AI ambitions, but Britain faces a critical question: how can it supply enough power for rapidly expanding datacenters without causing blackouts or inflating consumer bills?…
AI boffins teach office supplies to predict your next move
It was only a matter of time. Having invaded the software world, AI has now fixed its sights on once-benign household objects and desk fodder.…
'Fax virus' panicked a manager and sparked job-killing Reply-All incident
On Call By Friday it's only natural to look back upon the working week with a certain nostalgia, an emotion The Register celebrates each week in On Call – the reader-contributed column that shares your tales of tech support trauma.…
Anthropic brings mad Skills to Claude
Paying Anthropic customers can now teach their Claude new tricks, which the company calls Skills.…
TSMC hurrying to bring advanced chip tech to Arizona fab
TSMC is accelerating the rollout of advanced process nodes at its Arizona fabs to meet growing demand for American-made AI products.…
AI makes phishing 4.5x more effective, Microsoft says
People receiving an AI phishing email are 4.5 times more likely to click on the malicious link or file, according to Microsoft.…
Decomposed dinosaurs make Texas a top destination for AI bit barns
Everything is bigger in Texas and that includes the GPU bit barns at the heart of the AI boom.…
Vulnerability scores, huh, what are they good for? Almost nothing
Aram Hovespyan, co-founder and CEO of security biz Codific, says that the rating systems for identifying security vulnerabilities and assessing threat risk need to be overhauled.…
Nork scammers work the blockchain to steal crypto from job hunters
If you're a software developer looking for a job, North Korean scammers have an offer for you that's off the chain, the blockchain that is. These gangs have recently adopted a technique called EtherHiding, hiding malware inside blockchain smart contracts to sneak past detection and ultimately swipe victims' crypto and credentials, according to Google's Threat Intelligence team.…

