Latest
- OpenAI Executive Kevin Weil Is Leaving the Company
The former Instagram VP is departing the ChatGPT-maker, which is folding the AI science application he led into Codex.
- OpenAI Executive Kevin Weil Is Leaving the Company
The former Instagram VP is departing the ChatGPT-maker, which is folding the AI science application he led into Codex.
- How NIST's Cutback of CVE Handling Impacts Cyber Teams
Industry and ad hoc coalitions appear poised to help fill the gap created by NIST's decision to cut back on CVE data enrichment.
- How NIST's Cutback of CVE Handling Impacts Cyber Teams
Industry and ad hoc coalitions appear poised to help fill the gap created by NIST's decision to cut back on CVE data enrichment.
- Man with @ihackedthegovernment Instagram account tells judge, “I made a mistake"
Probation for man who used stolen logins and posted private info on social media.
- Man with @ihackedthegovernment Instagram account tells judge, “I made a mistake"
Probation for man who used stolen logins and posted private info on social media.
- Trump picks qualified, normal health leader to head CDC; experts still cautious
She's well qualified but will need to navigate RFK Jr.'s anti-vaccine agenda.
- Trump picks qualified, normal health leader to head CDC; experts still cautious
She's well qualified but will need to navigate RFK Jr.'s anti-vaccine agenda.
- Sources: Cursor in talks to raise $2B+ at $50B valuation as enterprise growth surges
Returning backers a16z and Thrive are expected to lead the round.
- Sources: Cursor in talks to raise $2B+ at $50B valuation as enterprise growth surges
Returning backers a16z and Thrive are expected to lead the round.
- Payouts King ransomware uses QEMU VMs to bypass endpoint security
The Payouts King ransomware is using the QEMU emulator as a reverse SSH backdoor to run hidden virtual machines on compromised systems and bypass endpoint security. [...]
- Payouts King ransomware uses QEMU VMs to bypass endpoint security
The Payouts King ransomware is using the QEMU emulator as a reverse SSH backdoor to run hidden virtual machines on compromised systems and bypass endpoint security. [...]
- Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing
In embracing device code phishing, attackers trick victims into handing over account access by using a service's legitimate new-device login flow.
- Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing
In embracing device code phishing, attackers trick victims into handing over account access by using a service's legitimate new-device login flow.
- Tesla tells HW3 owner to 'be patient' after 7 years of waiting for FSD
<p>Article URL: <a href="https://electrek.co/2026/04/17/tesla-hw3-owners-be-patient-7-years-fsd/">https://electrek.co/2026/04/17/tesla-hw3-owners-be-patient-7-years-fsd/</a></p> <p>Comments URL: <a href="https://news.ycombinator.com/item?id=47809347">https://news.ycombinator.com/item?id=47809347</a>&l…
- Tesla tells HW3 owner to 'be patient' after 7 years of waiting for FSD
Article URL: https://electrek.co/2026/04/17/tesla-hw3-owners-be-patient-7-years-fsd/ Comments URL: https://news.ycombinator.com/item?id=47809347 Points: 218 # Comments: 199
- "cat readme.txt" is not safe if you use iTerm2
<p>Article URL: <a href="https://blog.calif.io/p/mad-bugs-even-cat-readmetxt-is-not">https://blog.calif.io/p/mad-bugs-even-cat-readmetxt-is-not</a></p> <p>Comments URL: <a href="https://news.ycombinator.com/item?id=47809190">https://news.ycombinator.com/item?id=47809190</a></p> <p>Points: 288</…
- "cat readme.txt" is not safe if you use iTerm2
Article URL: https://blog.calif.io/p/mad-bugs-even-cat-readmetxt-is-not Comments URL: https://news.ycombinator.com/item?id=47809190 Points: 298 # Comments: 180
- ‘Tokenmaxxing’ is making developers less productive than they think
There's a lot more code — but it's a lot more expensive and requires a lot more rewriting.
- ‘Tokenmaxxing’ is making developers less productive than they think
There's a lot more code — but it's a lot more expensive and requires a lot more rewriting.
- $25,000 buys plenty of used EVs: Here are some options
Is $20,000–$25,000 a sweet spot for secondhand electric cars? We think so.
- $25,000 buys plenty of used EVs: Here are some options
Is $20,000–$25,000 a sweet spot for secondhand electric cars? We think so.
- All 12 moonwalkers had "lunar hay fever" from dust smelling like gunpowder (2018)
<p>Article URL: <a href="https://www.esa.int/Science_Exploration/Human_and_Robotic_Exploration/The_toxic_side_of_the_Moon">https://www.esa.int/Science_Exploration/Human_and_Robotic_Exploration/The_toxic_side_of_the_Moon</a></p> <p>Comments URL: <a href="https://news.ycombinator.com/item?id=47808913">https://news.ycombinator.com/it…
- All 12 moonwalkers had "lunar hay fever" from dust smelling like gunpowder (2018)
Article URL: https://www.esa.int/Science_Exploration/Human_and_Robotic_Exploration/The_toxic_side_of_the_Moon Comments URL: https://news.ycombinator.com/item?id=47808913 Points: 445 # Comments: 263
- Satellite and drone images reveal big delays in US data center construction
Data centers face construction delays and energy bottleneck as resistance grows.
- Satellite and drone images reveal big delays in US data center construction
Data centers face construction delays and energy bottleneck as resistance grows.
- Betting on the news raises ethical questions for journalists
Prediction market exchanges have created an environment where just about any piece of information is potentially monetizable: How well will BTS's new song perform this week? How hot will Los Angeles get? Will Donald Trump be impeached? Users can wager on all of that and, on some platforms, more gru…
- Betting on the news raises ethical questions for journalists
Prediction market exchanges have created an environment where just about any piece of information is potentially monetizable: How well will BTS's new song perform this week? How hot will Los Angeles get? Will Donald Trump be impeached? Users can wager on all of that and, on some platforms, more gruesome and violent outcomes in the […]
- Hackers are abusing unpatched Windows security flaws to hack into organizations
A security researcher published details of three security vulnerabilities in Windows Defender, and the code used to exploit them. Now, hackers are taking advantage of the vulnerabilities in real-life attacks, according to a cybersecurity firm.
- Hackers are abusing unpatched Windows security flaws to hack into organizations
A security researcher published details of three security vulnerabilities in Windows Defender, and the code used to exploit them. Now, hackers are taking advantage of the vulnerabilities in real-life attacks, according to a cybersecurity firm.
- Amazon won’t release Fire Sticks that support sideloading anymore
The two newest Fire Sticks block apps from outside of Amazon's store.
- Amazon won’t release Fire Sticks that support sideloading anymore
The two newest Fire Sticks block apps from outside of Amazon's store.
- Ridley Scott's post-apocalyptic The Dog Stars drops first trailer
"The world that was, doesn't exist. It's just us, trying to hold onto what was."
- Ridley Scott's post-apocalyptic The Dog Stars drops first trailer
"The world that was, doesn't exist. It's just us, trying to hold onto what was."
- Show HN: Smol machines – subsecond coldstart, portable virtual machines
<p>Article URL: <a href="https://github.com/smol-machines/smolvm">https://github.com/smol-machines/smolvm</a></p> <p>Comments URL: <a href="https://news.ycombinator.com/item?id=47808268">https://news.ycombinator.com/item?id=47808268</a></p> <p>Points: 440</p> <p># Comments: …
- Show HN: Smol machines – subsecond coldstart, portable virtual machines
Article URL: https://github.com/smol-machines/smolvm Comments URL: https://news.ycombinator.com/item?id=47808268 Points: 460 # Comments: 137
- Zoom teams up with World to verify humans in meetings
Meeting platform Zoom has announced a partnership with World, Sam Altman's human ID verification company, to ensure that the people attending meetings are actually human and not AI-generated imposters. Zoom will show a badge on verified participants' tile.
- Zoom teams up with World to verify humans in meetings
Meeting platform Zoom has announced a partnership with World, Sam Altman's human ID verification company, to ensure that the people attending meetings are actually human and not AI-generated imposters. Zoom will show a badge on verified participants' tile.
- Gazing Into Sam Altman’s Orb Now Proves You’re Human on Tinder
Honestly, what’s hotter than a real person?
- Gazing Into Sam Altman’s Orb Now Proves You’re Human on Tinder
Honestly, what’s hotter than a real person?
- Kyber (YC W23) Is Hiring a Head of Engineering
<p>Article URL: <a href="https://www.ycombinator.com/companies/kyber/jobs/TcEa3b5-head-of-engineering">https://www.ycombinator.com/companies/kyber/jobs/TcEa3b5-head-of-engineering</a></p> <p>Comments URL: <a href="https://news.ycombinator.com/item?id=47808047">https://news.ycombinator.com/item?id=47808047</a>…
- Kyber (YC W23) Is Hiring a Head of Engineering
Article URL: https://www.ycombinator.com/companies/kyber/jobs/TcEa3b5-head-of-engineering Comments URL: https://news.ycombinator.com/item?id=47808047 Points: 0 # Comments: 0
- Artemis II pilot talks about what it was really like to fly and land in Orion
"I've been thinking about reentry for three straight years."
- Artemis II pilot talks about what it was really like to fly and land in Orion
"I've been thinking about reentry for three straight years."
- Gigs turns your concert history into a personal live music archive
New iPhone app Gigs uses AI to turn old tickets, screenshots, and emails into a personal concert archive with stats, memories, and more.
- Gigs turns your concert history into a personal live music archive
New iPhone app Gigs uses AI to turn old tickets, screenshots, and emails into a personal concert archive with stats, memories, and more.
- Show HN: PanicLock – Close your MacBook lid disable TouchID –> password unlock
<p>I wrote this after the case of a Washington Post reporter, Hannah Natanson, was compelled to unlock her computer with her fingerprint. This resulted in access to her Desktop Signal on her computer, revealing sources and their conversations.<p><a href="https://www.yahoo.com/news/articles/washington-po…
- Show HN: PanicLock – Close your MacBook lid disable TouchID –> password unlock
I wrote this after the case of a Washington Post reporter, Hannah Natanson, was compelled to unlock her computer with her fingerprint. This resulted in access to her Desktop Signal on her computer, revealing sources and their conversations.https://www.yahoo.com/news/articles/washington-post-raid-pro...Edit: I've a lot more details about the legality and precedence on the apps landing page https://paniclock.github.io/ Comments URL: https://news.ycombinator.com/item?id=47807809 Points: 249 # Comme…
- Hyperscalers have already outspent most famous US megaprojects
<p>Article URL: <a href="https://twitter.com/finmoorhouse/status/2044933442236776794">https://twitter.com/finmoorhouse/status/2044933442236776794</a></p> <p>Comments URL: <a href="https://news.ycombinator.com/item?id=47807619">https://news.ycombinator.com/item?id=47807619</a></p> <p>Points: 27…
- Hyperscalers have already outspent most famous US megaprojects
Article URL: https://twitter.com/finmoorhouse/status/2044933442236776794 Comments URL: https://news.ycombinator.com/item?id=47807619 Points: 274 # Comments: 268