Feed aggregator
Surprise Will of Late Zappos CEO Adds New Twist for His Fortune
Article URL: https://www.wsj.com/us-news/law/surprise-will-of-late-zappos-ceo-adds-new-twist-for-his-fortune-66b2c5aa
Comments URL: https://news.ycombinator.com/item?id=43783078
Points: 1
# Comments: 1
We'll always need junior programmers
Article URL: https://world.hey.com/dhh/we-ll-always-need-junior-programmers-69ddb4a1
Comments URL: https://news.ycombinator.com/item?id=43783077
Points: 1
# Comments: 0
Improving RAG for Personalization with Author Features and Contrastive Examples
Article URL: https://arxiv.org/abs/2504.08745
Comments URL: https://news.ycombinator.com/item?id=43783073
Points: 1
# Comments: 0
This Trio Built Zapier One of the Biggest Tech Companies to Automate Workflow
Article URL: https://sidehustlecreator.beehiiv.com/p/zapier-founder-story
Comments URL: https://news.ycombinator.com/item?id=43783057
Points: 1
# Comments: 0
Show HN: Play Harmony Like a Stenographer
I made a musical instrument called the Harmonic Keyboard. It lets you express harmony declaratively—you choose where you want to go harmonically, and it figures out the individual notes and how to move between them.
The interface is inspired by stenography: you press up to three keys simultaneously, each controlling one axis—bass note, chord quality, and inversion. With just three fingers, you can access over 500 chords.
Transitions between chords are automatically voice-led: notes move minimally and musically from one chord to the next. Under the hood, the system selects voicings by minimizing the Wasserstein distance between the previous and next chord—subject to the constraint that all required chord tones are present.
I built this because I love harmony and music theory, and while I can play a bit of piano and guitar, my hands can’t keep up with my inner ear. This instrument meets me where I like to think—it handles the mechanics so I can focus on where I want the music to go.
It works in the browser, no setup. Beginners can start right away by jamming on diatonic chords in C major. If you can touch type, you can play simple songs from tabs within minutes.
It’s simple to start, but it opens up over time. If you’re an experienced musician, I especially hope you’ll try it—and give it time to click. There’s a bit of a learning curve, but if you can hear chords in your head and have an intuitive grasp of harmony, the instrument starts to feel like an extension of that instinct. For me, once it clicked, it subtly shifted how I think about chords—and even helped sharpen my ear. The three-axis layout gave me a new perspective on harmonic structure that’s carried over to other instruments, too.
Here’s a video of me jamming with it: https://youtu.be/BKQ3owJ3COI
Try it in the browser: https://harmonic-keyboard.com
Comments URL: https://news.ycombinator.com/item?id=43783025
Points: 1
# Comments: 0
Free YouTube to MP3 Converter
Article URL: https://y2mp3.art/
Comments URL: https://news.ycombinator.com/item?id=43783019
Points: 1
# Comments: 1
Skeletal Evidence of Roman Gladiator Bitten by Lion in Combat
Article URL: https://www.sciencedaily.com/releases/2025/04/250423164221.htm
Comments URL: https://news.ycombinator.com/item?id=43782994
Points: 1
# Comments: 1
Sixteen Organizations Endorse the UN Open Source Principles
Article URL: https://unite.un.org/news/sixteen-organizations-endorse-un-open-source-principles
Comments URL: https://news.ycombinator.com/item?id=43782984
Points: 1
# Comments: 0
Why Kleinanzeigen.de Picked Astro over Next.js
Article URL: https://d13z.dev/blog/07-why-kleinanzeigen-picked-astro-over-nextjs/
Comments URL: https://news.ycombinator.com/item?id=43782980
Points: 1
# Comments: 1
Google's Agent Development Kit – Getting Started Guide
Article URL: https://docs.google.com/document/d/19P-_yCr8fppdWjD5jqXuEF4jTKjRAgeo0i2yWjqP7KE/edit?usp=sharing
Comments URL: https://news.ycombinator.com/item?id=43782979
Points: 1
# Comments: 0
Interview with Owen Le Blanc, creator of the first Linux distribution
Article URL: https://lwn.net/SubscriberLink/1017846/957a6970ed507964/
Comments URL: https://news.ycombinator.com/item?id=43782975
Points: 1
# Comments: 0
What rattlesnake venom can teach us about evolution: New USF study
Article URL: https://www.sciencedaily.com/releases/2025/04/250423112038.htm
Comments URL: https://news.ycombinator.com/item?id=43782953
Points: 1
# Comments: 1
The Courage to Be Decent
Article URL: https://radleybalko.substack.com/p/the-courage-to-be-decent
Comments URL: https://news.ycombinator.com/item?id=43782926
Points: 1
# Comments: 0
3D data annotation tool using Gradio and Rerun
Article URL: https://github.com/rerun-io/annotation-example
Comments URL: https://news.ycombinator.com/item?id=43782921
Points: 3
# Comments: 1
US calls EU fines on Apple and Meta 'economic extortion'
You're Paying Too Much for Subscriptions. I Saved $400 in 15 Minutes With This App
California now 4th largest economy in the world
Article URL: https://www.gov.ca.gov/2025/04/23/california-is-now-the-4th-largest-economy-in-the-world/
Comments URL: https://news.ycombinator.com/item?id=43782902
Points: 3
# Comments: 0
Floating Point and IEEE 754 Compliance for Nvidia GPUs
Article URL: https://docs.nvidia.com/cuda/floating-point/index.html
Comments URL: https://news.ycombinator.com/item?id=43782891
Points: 1
# Comments: 0
Android malware turns phones into malicious tap-to-pay machines
Got an Android phone? Got a tap-to-pay card? Then you’re like millions of other users now at risk from a new form of cybercrime – malware that can read your credit or debit card and hand its data over to an attacker. A newly discovered malicious program effectively turns Android phones into malicious tap machines that vacuum up payment card data and send it to cybercriminals half a world away. All you have to do is install the software and tap your card to your phone – and criminals excel at persuading you to do just that.
The malware, which cybersecurity company Cleafy calls SuperCard X, uses a feature now found in most Android phones: near-field communication (NFC). This enables your phone to read the data on a supporting payment card when it comes close enough. It’s how tap-to-pay machines found in retailers and ATMs work their magic.
Attackers get the malicious software via a malware-as-a-service model. This enables them to become affiliates for the developers of the software, who typically offer it for a percentage of the attackers’ takings. They can then focus on finding and targeting victims with social engineering attacks, which Cleafy says they’ve been doing in Italy.
How the attack worksFirst the attackers have to get the malware onto someone’s Android phone. That starts with a fraudulent ‘smishing’ message sent via SMS or WhatsApp, often impersonating a bank and asking the user to call.
The telephone number connects the victim to the attacker, who then persuades them to give up their PIN and log into their bank account. From there, they persuade the victim to remove the spending limits on their card, and then to install what they claim is a security application, sent to their phone as a link. This contains the SuperCard X malware.
Finally comes the payoff. The attacker, who by now will likely have built up a rapport with the victim, will ask them to tap their card to their phone. The malware then captures the card details, which it then sends to the attacker’s own Android phone. They can then use the phone as a cloned card for contactless payments. If you’ve ever tapped your phone instead of your card to pay for something, you’ll know how easy that is to do.
Where did SuperCard X come from?Like much malware, SuperCard X didn’t come out of nowhere. Cleafy says that it shares code with another piece of malware called NGate, discovered last year. Both of these are likely built on concepts first outlined in NFCGate, a freely available open-source NFC software tool developed by German’s Technical University of Darmstadt.
SuperCard X’s developers have focused on making this software as stealthy as possible. Most antivirus programs for Android fail to spot it, says Cleafy. That’s because it asks for as few privileges as possible on the phone, and it doesn’t include many of the features that other malware has. In short, the less that a malicious program does on a phone, the smaller its footprint is and the more silent it can be.
This malware is a cybercriminal’s favorite for several reasons. Rather than attacking people with accounts at a particular bank, it works against anyone with a payment card, increasing the attacker’s scope. It’s also instant, compared to thefts by wire transfer, which can take days to complete.
How to protect yourselfLuckily, as with many things, the best defense is you. In this case, protection is simple. The cybercriminals behind this attack can’t do anything unless you install the software on your phone, and so they go through several steps to convince you to do so.
Be skeptical of text messages from people you don’t know, especially those claiming to be urgent. Scammers typically try and panic you into a fast response. When they get you on the phone, they can befriend you, further impeding your ability to think critically and say “no”.
If you can’t help yourself and feel compelled to take action, check in with a trusted family member if available to get their perspective. If you’re still convinced, then at least verify the message first. Call your financial institution through an official number – not through the one in the text message. We’ll bet a steak dinner that they won’t know what you’re talking about.
Never give personal details to anyone you don’t know who contacts you via text message, and never change your banking details at their request. And if anyone asks you to install software sent via text message, refuse and end the communication.
We don’t just report on phone security—we provide it
Cybersecurity risks should never spread beyond a headline. Keep threats off your mobile devices by downloading Malwarebytes for iOS, and Malwarebytes for Android today.