Computer Sciences

How voice assistants follow inaudible commands

An attack against speech recognition systems with manipulated audio files used to work only via a data interface. Now, all it takes is playing the secret messages via loudspeakers.

Software

GPS has its own 19-year cicada problem

Most people of a certain age remember the Y2K problem that worried digitalists worldwide when we transitioned from 1999 to 2000 on the night of Dec. 31, 1999. What would happen to computers and systems when the last two digits ...

page 3 from 12