20 Results for:WAV
- Sort by:
Researchers find cryptojacker hiding in Wav audio file
14 Jan 2020Victim network was compromised by obfuscated malware hiding a Monero cryptominer, lurking inside a Wav audio file Read More
Akamai discloses zero-click exploit for Microsoft Outlook
18 Dec 2023During research into an older Microsoft Outlook privilege escalation vulnerability, Akamai discovered two new flaws that can be chained for a zero-click RCE exploit. Read More
Sowing the seeds of growth through IP communications
16 Oct 2023One of the largest food processing companies in the US takes to cloud-based communications to bring about agility, mobility, efficiency and productivity gains, as well as cost reductions that are, quite literally, ... Read More
Microsoft launches Word transcription tool
02 Sep 2020The new Microsoft Word transcription feature makes crafting notes from an audio file a more streamlined process. The service is available with a Microsoft 365 subscription. Read More
A comparison of 6 speech-to-text services
26 Aug 2019AWS, Microsoft and Google can add speech-to-text capabilities to apps, but they're not your only option. Compare those cloud-based tools to other AI-infused transcription services. Read More
Speech to text for deaf users aids in accessibility
02 Dec 2020For the millions of people who are hard of hearing, speech-to-text advancements have improved their ability to complete daily tasks -- but the tech still has a long way to go. Read More
Company accused of spying on Assange acted for Ecuadorian Intelligence, says ex UC Global manager
12 Nov 2020Former operations chief of UC Global told Spanish Court the company accused of spying on Assange at the Ecuadorian Embassy in London was acting on the orders of Ecuadorian Intelligence Read More
How to embed video with SharePoint Media Web Part
29 Feb 2016Adding audio or video to a SharePoint page isn't rocket science -- but there are some tricks to make it easier. An expert explains. Read More
How does an Amazon Echo vulnerability enable attackers to eavesdrop?
09 Oct 2017Hackers could take advantage of a physical Amazon Echo vulnerability to turn the Echo into a listening device. Judith Myerson explains how this works and what can be done about it. Read More
What tools can bypass Google's CAPTCHA challenges?
09 Aug 2017The ReBreakCaptcha exploit can bypass Google's reCAPTCHA verification system using flaws in Google's own API. Expert Michael Cobb explains how the attack works. Read More