In today’s 2-Minute Tech Briefing, HP plans up to 6,000 job cuts as rising component costs and an AI pivot reshape its operations. A new study finds 78% of IT job postings now require AI skills. And researchers warn that AI-powered browsers can be hijacked through hidden URL-fragment prompts in a newly exposed “HashJack” attack.
Register Now
Hello and welcome to your 2-Minute Tech Briefing from Computerworld. I'm your host, Arnold Davick, reporting from the floor of the New York Stock Exchange. Here are the top IT news stories you need to know for Wednesday, December 3rd.
First up from ComputerWorld, HP will eliminate anywhere from four to six thousand jobs by 2028 as part of what it calls an "AI driven business transformation". The company cites surging memory chip costs and the need to remain competitive as AI reshapes Product Development, Operations and customer support.
HP, CEO says the restructuring will cost $650 million to implement, but will ultimately save $1 billion over three years. The company is moving toward full deployment company wide, after piloting AI internally for two years.
Next up, from CIO, a new study shows 78% of IT job postings across g7 nations now explicitly require AI skills. The AI workforce consortium analyzed job postings and found that seven of the 10 fastest growing it roles all have direct ties to AI.
Those include software engineering, cloud engineering and data engineering. Researchers warn that soft skills are becoming equally critical as organizations push for responsible and collaborative AI deployment. And finally, from CSO online, researchers have uncovered a new indirect prompt injection attack against AI powered browsers and browser assistants.
The attack called HashJack hides malicious instructions inside URL fragments the portion after the # symbol. Those hidden prompts can manipulate AI assistance in browsers such as comet, Microsoft copilot and Google Gemini, this can redirect users to phishing pages steal credentials or exfiltrate sensitive data.
Researchers warn that any legitimate website can be weaponized if an attacker controls the URL. That's today's 2-Minute Tech Briefing. For more enterprise tech news, visit Computerworld, CIO, and CSOonline, and don't forget to like and subscribe to the TechTalk YouTube channel.