Thu. 06/23 – What If My Voice Was Your Alexa?

Thu. 06/23 – What If My Voice Was Your Alexa?

Up next

The AI Sec-Pocalypse Is Actually Nigh?

Google reported the first known case of hackers using AI to discover and weaponize a zero-day vulnerability. OpenAI launched a $4B+ deployment company and acquired Tomoro. Apple plans Liquid Glass refinements for macOS 27, TikTok rolls out an ad-free tier in the UK, and Ben Thomp ...  Show more

Chickens, Roosting

Nintendo raised the Switch 2 price to $500 amid a global memory shortage. ShinyHunters forced Canvas offline during finals season. Researchers found 5,000+ insecure vibe-coded apps, Mozilla credits Mythos for 423 Firefox bug fixes in April, and France escalates its Musk probe. Ni ...  Show more

Recommended Episodes

Episode 294 Alexa's New AI Voice
Echo Tips

It looks like a version of the new AI Voice, for Alexa is here. Back in the September Amazon Event, we were told and even got to hear a small segment of what the new Alexa Voice would sound like, join us as we dive into the Alexa Beta and test out the new voice. Its hard to te ...

  Show more

The high stakes for AI Alexa
The Vergecast

AI will fix everything, right? In this episode, friend of The Verge (and Waveform co-host) David Imel joins Nilay and David to talk all about Alexa Plus, and the AI-powered voice assistant Amazon thinks can do everything from turn on your lights to order your friend an Uber. The ...  Show more

Facebook Wants to Put a Camera In Your Living Room
Rich On Tech

Facebook unveils new Portal video chat devices, including a model for your TV; A look at the Nintendo Switch Lite; Alexa gets smart about the election; the popular Pocket Casts podcast app goes free; new features in iOS 13; a cool new Roku feature that lets you search by movie qu ...  Show more

Study Reveals Vulnerabilities in Alexa, Siri, and Google Assistant to Malicious Commands
Open AI

In this episode, we explore a recent study that uncovers how popular voice assistants like Alexa, Siri, and Google Assistant are susceptible to malicious commands. We discuss the potential risks and what users can do to protect their devices.



Get ...

  Show more