ALL >> Technology,-Gadget-and-Science >> View Article
Ai Tools Can Now Steal Passwords With 93% Accuracy By Listening To Your Keystrokes!
The rapid integration of artificial intelligence (AI) into our lives has brought both convenience and complexity. A recent study conducted by researchers from esteemed institutions, including Durham University, the University of Surrey, and the Royal Holloway University of London, has unveiled a concerning revelation: the potential of AI to exploit acoustic side-channels for cyberattacks, targeting keystrokes during online calls and potentially stealing passwords with an alarming accuracy rate of 93%.
The research delves into the realm of cyber warfare, revealing a new facet of vulnerability that stems from the convergence of AI and cybersecurity. Acoustic side-channel attacks, as highlighted by the researchers, entail leveraging information derived from peripheral aspects like keyboard sounds rather than a direct system breach. The AI tool developed for this purpose employs deep learning, mirroring the neural processes of the human brain to decipher auditory patterns. Interestingly, the study also references historical echoes of this concept, citing a 1982 partially declassified NSA document that mentions 'acoustic emanations' ...
... as a vulnerability.
The implications of this study extend beyond mere keystrokes; they delve into the broader realm of AI's impact on cybersecurity and privacy. Personalization of scams is one disconcerting aspect, as AI's ability to tailor attacks to individual targets makes detection increasingly challenging. The synergy between the proliferation of AI and 5G technology heightens the risk of cyber threats, particularly as they target internet-connected devices. Maryam Mehrnezhad, one of the researchers, emphasizes a shift in responsibility from end users to the cybersecurity community, advocating for the development of proactive solutions that counteract evolving threats.
While this study underscores potential vulnerabilities, it catalyzes a larger conversation around ethical AI use and the necessity for regulatory frameworks. The transformative potential of AI is undeniable, but its dual-use nature necessitates a balanced approach that safeguards against malicious applications. Striking this balance between technological advancement and security is pivotal.
In response to the evolving cyber risk landscape, it becomes imperative to establish comprehensive compliances and regulations governing AI technologies. The insights garnered from studies like this are instrumental in shaping these regulations, pinpointing potential weak points and threats. This study can prompt organizations, industries, and governing bodies to reevaluate existing cybersecurity strategies and formulate innovative approaches to tackle the emerging challenges posed by AI-driven attacks.
In essence, the study casts a spotlight on the shadowy territory of AI-driven acoustic side-channel attacks, which can accurately pilfer passwords during online calls. While AI brings a spectrum of benefits, it simultaneously unveils vulnerabilities that necessitate a vigilant response. The responsibility to address these concerns stretches beyond individual users, demanding a collective effort from the cybersecurity community and policymakers. Ultimately, the study reinforces the urgency of establishing ethical AI guidelines and regulations that harness the power of AI while preemptively curbing potential misuses and cyber threats.
Add Comment
Technology, Gadget and Science Articles
1. The Reason Why Virtual Answering Service Is NeedfulAuthor: Eliza Garran
2. 5 Reasons Business Cards Still Matter
Author: prinitusa
3. Mean Stack Popularity 2025: Usage Patterns And Hiring Signals
Author: Mukesh Ram
4. Fashion & Apparel Brands Analysis On Amazon - August 2025
Author: Actowiz Metrics
5. Deodap Product Data Scraping For Market Analysis Insights
Author: Web Data Crawler
6. The Future Of Fleet Operations: How Smart Technology Is Revolutionizing Transportation Efficiency
Author: logitrac360
7. Using Rfid Tags For Theft Prevention And Security
Author: Unnati sharma
8. Wireless Sensor Network Using Multiple Arduino Nano Esp32 Boards For Home & Fitness Monitoring
Author: Ezyki
9. Getting Started With Web Scraping In Go - The Ultimate Guide
Author: Real Data API
10. Addact’s On-demand Model: Pay For Expertise, Not Overheads
Author: Addact Technologies
11. Explore Ajio And Myntra Festival Sale Insights For Shoppers
Author: Retail Scrape
12. Professional Web Scraping Service - 8 Key Indicators
Author: Actowiz Solutions
13. Exploring Cashify Datasets For E-commerce And Retail Analysis
Author: Web Data Crawler
14. Extract Social Media Analysis From Facebook And Instagram Apis
Author: REAL DATA API
15. Ptz Camera For Church: How To Stream Services Like A Pro
Author: Videocast






