20 Results for:WAV

  • Sort by: 

Researchers find cryptojacker hiding in Wav audio file

By Alex Scroxton 14 Jan 2020

Victim network was compromised by obfuscated malware hiding a Monero cryptominer, lurking inside a Wav audio file Read More

Akamai discloses zero-click exploit for Microsoft Outlook

By Arielle Waldman 18 Dec 2023

During research into an older Microsoft Outlook privilege escalation vulnerability, Akamai discovered two new flaws that can be chained for a zero-click RCE exploit. Read More

Sowing the seeds of growth through IP communications

By Joe O’Halloran 16 Oct 2023

One of the largest food processing companies in the US takes to cloud-based communications to bring about agility, mobility, efficiency and productivity gains, as well as cost reductions that are, quite literally, ... Read More

Microsoft launches Word transcription tool

By Mike Gleason 02 Sep 2020

The new Microsoft Word transcription feature makes crafting notes from an audio file a more streamlined process. The service is available with a Microsoft 365 subscription. Read More

A comparison of 6 speech-to-text services

By George Lawton 26 Aug 2019

AWS, Microsoft and Google can add speech-to-text capabilities to apps, but they're not your only option. Compare those cloud-based tools to other AI-infused transcription services. Read More

Speech to text for deaf users aids in accessibility

By Kassidy Kelley 02 Dec 2020

For the millions of people who are hard of hearing, speech-to-text advancements have improved their ability to complete daily tasks -- but the tech still has a long way to go. Read More

Company accused of spying on Assange acted for Ecuadorian Intelligence, says ex UC Global manager

By Bill Goodwin, Ter García 12 Nov 2020

Former operations chief of UC Global told Spanish Court the company accused of spying on Assange at the Ecuadorian Embassy in London was acting on the orders of Ecuadorian Intelligence Read More

How to embed video with SharePoint Media Web Part

By Brien Posey 29 Feb 2016

Adding audio or video to a SharePoint page isn't rocket science -- but there are some tricks to make it easier. An expert explains. Read More

How does an Amazon Echo vulnerability enable attackers to eavesdrop?

By Judith Myerson 09 Oct 2017

Hackers could take advantage of a physical Amazon Echo vulnerability to turn the Echo into a listening device. Judith Myerson explains how this works and what can be done about it. Read More

What tools can bypass Google's CAPTCHA challenges?

By Michael Cobb 09 Aug 2017

The ReBreakCaptcha exploit can bypass Google's reCAPTCHA verification system using flaws in Google's own API. Expert Michael Cobb explains how the attack works. Read More