Most Viewed Content:

New Apple AirPods patent can monitor the wearer’s brainwaves and other biosignals

According to the latest list published by the United...

Arc Browser will be available on Windows 10 and Windows 11 platforms in June at the earliest

Arc Browser is based on Chromium, in macOS platform...

Microsoft working on new features for Win11 / Win12: smart notifications, depth-of-field effects

According to the source Albacore (@thebookisclosed), Microsoft is preparing...

Researchers successfully train a deep-learning model to steal data

Did you know that what you type on the keyboard may be overheard by others? Researchers in the UK have developed a deep learning model that can steal sensitive information like usernames, passwords and messages by capturing and decoding keystrokes with 95% accuracy.

Image source Pexels

This sound recognition algorithm can listen to the user’s keystrokes through video conferencing software such as Zoom and Skype without access to the device’s microphone, and infer what they typed, but the accuracy rate will drop to 93% and 91.7%, respectively.

The research reveals how deep learning might be used to develop new types of malware that use sound to steal information, such as credit card numbers, messages, conversations, and other personal information. Advances in machine learning and the availability of cheap, high-quality microphones on the market have made sound-based attacks more feasible than other methods limited by data transfer speed and distance.

How does this voice recognition algorithm work? The researchers used a MacBook Pro laptop, tapped each of the 36 keys on it 25 times, and recorded the sound produced by each key. The recording was performed using an iPhone 13 mini 17 centimeters away from the laptop.

From the recordings, the researchers generated waveforms and spectrograms that differentiated each key. Then, the unique sound of each key was used to train an image classifier called “CoAtNet,” which can predict which key on the keyboard is pressed.

According to the research paper, users can protect themselves from this attack by changing their typing patterns or using complex random passwords. White noise or software that mimics the sound of keystrokes can also be used to reduce the accuracy of the model.

Currently, the best defense against such voice-based attacks is to use biometric authentication such as fingerprint scanners, facial recognition, or iris scanners.

Latest

Starting from 48,900, Geely Panda Karting officially starts pre-sale

Geely Panda Karting officially started pre-sale. The pre-sale price...

Ford: Expand charging network, fuel/ hybrid/ pure electric in parallel

Recently, Ford released the company's comprehensive annual report for...

Chery’s two new cars are exposed, targeting overseas markets

Recently, some media exposed the actual cars of two...

New Trumpchi Shadow Leopard to launch on May 1, upgraded performance rims

Recently, we learned from the official that the 2024...

Newsletter

Don't miss

Starting from 48,900, Geely Panda Karting officially starts pre-sale

Geely Panda Karting officially started pre-sale. The pre-sale price...

Ford: Expand charging network, fuel/ hybrid/ pure electric in parallel

Recently, Ford released the company's comprehensive annual report for...

Chery’s two new cars are exposed, targeting overseas markets

Recently, some media exposed the actual cars of two...

New Trumpchi Shadow Leopard to launch on May 1, upgraded performance rims

Recently, we learned from the official that the 2024...

Samsung Galaxy S25 Ultra expected to feature 5000mAh + 45W Combo

Technology media WccFtech recently reported that Samsung will not...
Threza Gabriel
Threza Gabrielhttps://www.techgoing.com
Threza Gabriel is a news writer at TechGoing. TechGoing is a global tech media to brings you the latest technology stories, including smartphones, electric vehicles, smart home devices, gaming, wearable gadgets, and all tech trending.