" " Ears of the AI; typing sounds on Zoom unveil silent cybersecurity threats – Web 3 News Hubb " "
Web 3 News Hubb
  • Home
  • Edge Computing
  • Artificial Intelligence
  • Blockchain
  • Contact
No Result
View All Result
Web 3 News Hubb
  • Home
  • Edge Computing
  • Artificial Intelligence
  • Blockchain
  • Contact
No Result
View All Result
Web 3 News Hubb
No Result
View All Result
Home Edge Computing

Ears of the AI; typing sounds on Zoom unveil silent cybersecurity threats

admin by admin
August 13, 2023
in Edge Computing


With the rapid surge in the adoption of video conferencing tools like Zoom and the ubiquitous presence of built-in microphones in devices, the potential for cyber-attacks based on sound has escalated significantly.

The act of entering a seemingly innocuous computer password while engaged in a casual Zoom conversation has taken on a new layer of intrigue, as recent research brings to light a startling revelation: artificial intelligence (AI) can deduce the very keys being pressed by analyzing the distinctive sounds of typing.

This unsettling discovery underscores the growing concern surrounding cybersecurity within the context of our virtual interactions.

With the rapid surge in the adoption of video conferencing tools like Zoom and the ubiquitous presence of built-in microphones in devices, the potential for cyber-attacks based on sound has escalated significantly. As a response to this evolving threat landscape, researchers have ingeniously developed a pioneering system that has the uncanny ability to accurately decipher the keys being pressed on a laptop keyboard.

This groundbreaking solution boasts an impressive accuracy rate of over 90%, positioning it at the forefront of acoustic-based cybersecurity measures.

Dr Ehsan Toreini, a co-author of the study from the University of Surrey, emphasizes the inevitability of these AI models advancing in accuracy over time. He stresses the need for proactive discussions on the governance of AI technologies, particularly in the context of the growing presence of smart devices equipped with microphones within households.

The profound implications of this research have prompted a call to action, urging a deeper understanding of the intricate intersections between technological progress, security vulnerabilities, and responsible AI deployment.

The research, unveiled as part of the IEEE European Symposium on Security and Privacy Workshops, delves into the intricate mechanics of the solution.

Machine learning algorithms take center stage as they meticulously analyze and decode the unique acoustic signatures produced by each keyboard key. In a painstaking process, the researchers meticulously pressed each of the 36 keys on a MacBook Pro in various permutations, capturing the resulting sounds during both phone and Zoom calls.

The outcome was nothing short of remarkable: the system demonstrated its prowess by accurately identifying the keys in question, achieving a 95% accuracy rate for phone call recordings and an impressive 93% accuracy rate for Zoom call recordings.

While the primary focus of the study centred on laptop keyboards, the implications reverberate throughout the entire spectrum of computing devices. The researchers underscore the alarming potential for such sound-based “side-channel attacks” to infiltrate any keyboard, serving as a potent reminder of the ever-evolving nature of cyber threats.

As the digital landscape evolves, so must our strategies to combat these emerging challenges. The study serves as a clarion call for heightened vigilance and the implementation of prudent countermeasures.

Recommendations include opting for biometric passwords whenever possible and activating two-step verification systems. Additionally, the strategic use of capitalization variations and the incorporation of numbers and symbols can serve as effective deterrents against potential attacks.

In an era where virtual interactions are the norm, this research also underscores the need for a new level of awareness. The subtleties of movement and visual cues during typing are not immune to the scrutiny of the virtual realm, necessitating a heightened awareness of safeguarding sensitive information during digital conversations.

As the boundaries between our physical and digital worlds continue to blur, this study serves as a poignant reminder of the imperative to safeguard our interactions, identities, and data in an ever-changing technological landscape.

For more such content, visit: https://bit.ly/3ijY5Gt





Source link

Previous Post

CML 2.6 introduces revamped Workbench

Next Post

Mindgrasp: Everything You Need to Know

Next Post

Mindgrasp: Everything You Need to Know

  • Ethereum Node and Client Comparisons

    0 shares
    Share 0 Tweet 0
  • ChatGPT: The Technicalities behind the Rising Star of Conversational AI | by ximnet | Mar, 2023

    0 shares
    Share 0 Tweet 0
  • The Crucial Role of Network Integration in Large Enterprises

    0 shares
    Share 0 Tweet 0
  • Xsolla and Crypto.com Partner to Integrate Payment Solutions

    0 shares
    Share 0 Tweet 0
  • How to Create a Healthcare Chatbot Using NLP | by Devashish Datt Mamgain | Mar, 2023

    0 shares
    Share 0 Tweet 0

© Web3 News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy and Terms & Conditions.

Navigate Site

  • Home
  • Edge Computing
  • Artificial Intelligence
  • Blockchain
  • Contact

Newsletter Sign Up.

No Result
View All Result
  • Home
  • Edge Computing
  • Artificial Intelligence
  • Blockchain
  • Contact

© 2022 Web 3 News Hubb All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In