That doesn't even qualify as a hack because not only do they need their microphone, speaker and voice rec enabled, they also have to download an audio recording and play it. Hence, they'll be listening to the 'malicious file' running commands (at which point, they can simply close it). Unbelievable.
One of the replies to that article is classic:
Quote: "I found a flaw with Vista myself. If I am logged into my machine and someone comes up behind me they could bash me over the head and then run commands successfully on my PC."
"Computers are useless, they can only give you answers."