Tag Archive for: Audio

Audio Router routes audio from programs to different audio devices


Let’s assume that you want to use headphone for Microsoft Edge’s YouTube video but a speaker when watching movies on the VLC media player or Windows Media Player. Such things are not possible on a Windows PC. While Windows 10 lets you set preferred speakers for an app, Windows 8.1/7 users have no such option. If your version of Windows does not allow you to set different speaker for different apps, you may want to check out Audio Router.

Audio Router for Windows PC

Audio Router is a free Windows software that allows you to choose the different audio output for different apps. For instance, you can set headphone while listening to music on Spotify and use the speaker for other purposes. It is a portable Windows software, which means you do not have to install it on your computer.

After downloading, unzip the zipped folder and double-click on Audio Router.exe file to open it.

set different speaker for different apps in Windows 10

On the UI, you can find all the opened apps as well as default audio device, and all the connected audio devices including headphone, Bluetooth speaker, wired speaker, etc.

Let’s assume that you want to set speakers for Microsoft Edge. For that, click the arrow icon visible in the bottom of an app and select Route.

Audio Router for Windows PC

You will get a popup window with a drop-down menu. You need to select an audio device or output from the corresponding drop-down menu.

Having done that, your app will start using that audio output instead of the default one.

Audio Router has some other options as well. Like you can mute a device by clicking the Mute button, duplicate an audio output by clicking the Duplicate button and so on.

Audio Router is a simple open-source Windows software, and if you like it, you can download it from Github.

Source…

Breaches, patches, leaks and tweaks! [Audio + Text] – Naked Security


Latest epidode – listen now.

DOUG.  Breaches, breaches, patches, and typios.

All that, and more, on the Naked Security podcast.

[MUSICAL MODEM]

Welcome to the podcast, everybody.

I am Doug Aamoth; he is Daul Pucklin…

…I’m sorry, Paul!


DUCK.  I think I’ve worked it out, Doug.

“Typios” is an audio typo.


DOUG.  Exactly!


DUCK.  Yes… well done, that man!


DOUG.  So, what do typos have to do with cybersecurity?

We’ll get into that…

But first – we like to start with our This Week in Tech History segment.

This week, 23 January 1996, version 1.0 of the Java Development Kit said, “Hello, world.

Its mantra, “Write once, run anywhere”, and its release right as the web’s popularity was really reaching a fever pitch, made it an excellent platform for web-based apps.

Fast-forward to today, and we’re at version 19, Paul.


DUCK.  We are!

Java, eh?

Or “Oak”.

I believe that was its original name, because the person who invented the language had an oak tree growing outside his office.

Let us take this opportunity, Doug, to clear up, for once and for all, the confusion that lots of people have between Java and JavaScript.


DOUG.  Ooooooh…


DUCK.  A lot of people think that they are related.

They’re not related, Doug.

They’re *exactly the same* – one is just the shortened… NO, I’M COMPLETELY KIDDING YOU!

Java is not JavaScript – tell your friends!


DOUG.  I was, like, “Where is this going?” [LAUGHS]


DUCK.  JavaScript basically got that name because the word Java was cool…

…and programmers run on coffee, whether they’re programming in Java or JavaScript.


DOUG.  Alright, very good.

Thank you for clearing that up.

And on the subject of clearing things up, GoTo, the company behind such products as GoToMyPC, GoToWebinar, LogMeIn, and (cough, cough) others says that they’ve “detected unusual activity within our development environment and third party cloud storage service.”

Paul, what do we know?

GoTo admits: Customer cloud backups stolen together with decryption key


DUCK.  That was back on the last day of November 2022.

And the (cough, cough) that you mentioned earlier, of course, is GoTo’s…

Source…

True crime stories – A day in the life of a cybercrime fighter [Audio + Text] – Naked Security


Paul Ducklin talks to Peter Mackenzie, Director of Incident Response at Sophos, in a cybersecurity session that will alarm, amuse and educate you, all in equal measure.

[MUSICAL MODEM]


PAUL DUCKLIN.  Welcome to the Naked Security podcast, everybody.

This episode is taken from one of this year’s Security SOS Week sessions.

We’re talking to Peter Mackenzie, the Director of Incident Response at Sophos.

Now, he and his team… they are like a cross between the US Marine Corps and the Royal Navy Special Boat Service.

They go steaming in where angels fear to tread – into networks that are already under attack – and sort things out.

Because this episode was originally presented in video form for streaming, the audio quality isn’t great, but I think you’ll agree that the content is interesting, important and informative, all in equal measure.

[MORSE CODE]

[ROBOT VOICE: Sophos Security SOS]


DUCK.  Today’s topic is: Incident response – A day in the life of a cyberthreat responder.

Our guest today is none other than Peter Mackenzie.

And Peter is Director of Incident Response at Sophos.


PETER MACKENZIE.  Yes.


DUCK.  So, Peter… “incident response for cybersecurity.”

Tell us what that typically involves, and why (unfortunately) you often need to get called in.


PETER.  Typically, we’re brought in either just after an attack or while one is still unfolding.

We deal with a lot of ransomware, and victims need help understanding what happened.

How did the attacker get in?

How did they do what they did?

Did they steal anything?

And how do they get back to normal operations as quickly and as safely as possible?


DUCK.  And I guess the problem with many ransomware attacks is…

…although they get all the headlines for obvious reasons, that’s often the end of what could have been a long attack period, sometimes with more than one load of crooks having been in the network?


PETER.  Yes.

I describe ransomware as the “receipt” they leave at the end.


DUCK.  Oh, dear.


PETER.  And it is, really – it’s the ransom demand.


DUCK.  Yes, because you can’t help but notice it, can you?

The wallpaper has got flaming skulls on it… the ransom…

Source…

Indians Are Being Monitored By A Cloned WhatsApp Software That Records Audio And Video 2022


Indians are being monitored by a cloned WhatsApp software that records audio and video 2022

Among the most used apps in India is WhatsApp. More than 400 million Indians actively use the Meta-owned app. Several WhatsApp clone apps are online, even if the original app is free. These clone apps offer some functionalities that are now unavailable on WhatsApp. GB WhatsApp is one such software. According to reports, an unofficial WhatsApp clone software is monitoring the discussions of Indian users.

whatsapp's cloned application spying on indians through recording video audio

According to the data (via) published by cybersecurity research company ESET, India is one of the countries with the highest rates of Android trojan detections. Even if GB WhatsApp cannot be downloaded from the Play Store, it may be set up using an APOK file.

There is no other private communication platform like WhatsApp in India and the entire world. The Facebook-owned American freeware pass messaging application boasts 2 billion monthly users in 180 nations. It is undoubtedly the most widely used messaging service in the world, with an estimated 65 billion texts being exchanged daily and 2 billion seconds of voice and video conversations made daily in 2018.

With 400 million active users, India is WhatsApp’s largest market. In addition to becoming free, WhatsApp is easy to use and enables the sending of text, audio, and video messages and documents. Fresh analysis has cautioned that a cloned, third-party, unapproved edition of WhatsApp is dominating in the country in terms of spying on people’s chats and that India is one of the nations with the highest amount of Android malware detections.

whatsapp: how to use two different accounts on one phone in 4 steps

Most importantly, though, it guarantees end-to-end encryption for all texts and calls, ensuring users of their privacy and the secrecy of their communications. They are not viewable or listenable to anyone outside of this conversation, not even WhatsApp.

The texting service’s previous reputation for confidentiality is now in doubt in India. Beyond protecting content from being communicated and kept on its service from illegal users and exploitation, serious questions are being raised regarding WhatsApp’s capability to safeguard a person’s privacy.

Ironically, a slew of unrelated recent…

Source…