Skip to main content

Anthropic's Claude Can Now Use Your Computer To Finish Tasks

6 days 17 hours ago
Anthropic is testing a new Claude feature that lets users send a request from their phone and have the AI carry it out directly on their computer, such as opening apps, using a browser, or editing files. The move follows the viral spread of OpenClaw earlier this year, which has gained cult popularity among devs for the ability to run local, 24/7 personal workflows. CNBC reports: Users can now message Claude a task from a phone, and the AI agent will then complete that task, Anthropic announced Monday. After being prompted, Claude can open apps on your computer, navigate a web browser and fill in spreadsheets, Anthropic said. One prompt Anthropic demonstrated in a video posted Monday is a user running late for a meeting. The user asks Claude to export a pitch deck as a PDF file and attach it to a meeting invite. The video shows Claude carrying out the task. [...] Anthropic cautioned that computer use "is still early compared to Claude's ability to code or interact with text." "Claude can make mistakes, and while we continue to improve our safeguards, threats are constantly evolving," Anthropic warned. The company added that it has built the computer use capability "with safeguards that minimize risk," and that Claude will always request permission before accessing new apps. Users can use Dispatch, a feature it released last week in Claude Cowork. That lets users have a continuous conversation with Claude from a phone or desktop and assign the agent tasks.

Read more of this story at Slashdot.

BeauHD

Self-Propagating Malware Poisons Open Source Software, Wipes Iran-Based Machines

6 days 18 hours ago
An anonymous reader quotes a report from Ars Technica: A new hacking group has been rampaging the Internet in a persistent campaign that spreads a self-propagating and never-before-seen backdoor -- and curiously a data wiper that targets Iranian machines. The group, tracked under the name TeamPCP, first gained visibility in December, when researchers from security firm Flare observed it unleashing a worm that targeted cloud-hosted platforms that weren't properly secured. The objective was to build a distributed proxy and scanning infrastructure and then use it to compromise servers for exfiltrating data, deploying ransomware, conducting extortion, and mining cryptocurrency. The group is notable for its skill in large-scale automation and integration of well-known attack techniques. More recently, TeamPCP has waged a relentless campaign that uses continuously evolving malware to bring ever more systems under its control. Late last week, it compromised virtually all versions of the widely used Trivy vulnerability scanner in a supply-chain attack after gaining privileged access to the GitHub account of Aqua Security, the Trivy creator. Over the weekend, researchers said they observed TeamPCP spreading potent malware that was also worm-enabled, meaning it had the potential to spread to new machines automatically, with no interaction required of victims behind the keyboard. [...] As the weekend progressed, CanisterWorm [as Aikido has named the malware] was updated to add an additional payload: a wiper that targets machines exclusively in Iran. When the updated worm infects machines, it checks if the machine is in the Iranian timezone or is configured for use in that country. When either condition was met, the malware no longer activated the credential stealer and instead triggered a novel wiper that TeamPCP developers named Kamikaze. Eriksen said in an email that there's no indication yet that the worm caused actual damage to Iranian machines, but that there was "clear potential for large-scale impact if it achieves active spread." It's unclear what the motive is for TeamPCP. Aikido researcher Charlie Eriksen wrote: "While there may be an ideological component, it could just as easily be a deliberate attempt to draw attention to the group. Historically, TeamPCP has appeared to be financially motivated, but there are signs that visibility is becoming a goal in itself. By going after security tools and open-source projects, including Checkmarx as of today, they are sending a clear and deliberate signal."

Read more of this story at Slashdot.

BeauHD

Remote or not, workers are drifting back toward the city

6 days 18 hours ago
Global hiring data shows employees relocating nearer major hubs, reversing pandemic-era shift

The post-pandemic shift away from cities has reversed since 2022, with return-to-office mandates playing a role, according to a new report on global hiring trends.…

Lindsay Clark

CMA dithers on cloud probe as Microsoft's meter runs on taxpayer dime

6 days 18 hours ago
Every month of 'careful consideration' is another month Redmond laughs all the way to the bank

Here's the uncomfortable truth: every week the UK's Competition and Markets Authority (CMA) hesitates on its decision on the outcome of its public cloud services market investigation, the meter keeps running and taxpayers continue to foot the bill.…

Bill McCluggage