123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Technology,-Gadget-and-Science >> View Article

Ai Tools Can Now Steal Passwords With 93% Accuracy By Listening To Your Keystrokes!

Profile Picture
By Author: joy
Total Articles: 177
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The rapid integration of artificial intelligence (AI) into our lives has brought both convenience and complexity. A recent study conducted by researchers from esteemed institutions, including Durham University, the University of Surrey, and the Royal Holloway University of London, has unveiled a concerning revelation: the potential of AI to exploit acoustic side-channels for cyberattacks, targeting keystrokes during online calls and potentially stealing passwords with an alarming accuracy rate of 93%.

The research delves into the realm of cyber warfare, revealing a new facet of vulnerability that stems from the convergence of AI and cybersecurity. Acoustic side-channel attacks, as highlighted by the researchers, entail leveraging information derived from peripheral aspects like keyboard sounds rather than a direct system breach. The AI tool developed for this purpose employs deep learning, mirroring the neural processes of the human brain to decipher auditory patterns. Interestingly, the study also references historical echoes of this concept, citing a 1982 partially declassified NSA document that mentions 'acoustic emanations' ...
... as a vulnerability.

The implications of this study extend beyond mere keystrokes; they delve into the broader realm of AI's impact on cybersecurity and privacy. Personalization of scams is one disconcerting aspect, as AI's ability to tailor attacks to individual targets makes detection increasingly challenging. The synergy between the proliferation of AI and 5G technology heightens the risk of cyber threats, particularly as they target internet-connected devices. Maryam Mehrnezhad, one of the researchers, emphasizes a shift in responsibility from end users to the cybersecurity community, advocating for the development of proactive solutions that counteract evolving threats.

While this study underscores potential vulnerabilities, it catalyzes a larger conversation around ethical AI use and the necessity for regulatory frameworks. The transformative potential of AI is undeniable, but its dual-use nature necessitates a balanced approach that safeguards against malicious applications. Striking this balance between technological advancement and security is pivotal.

In response to the evolving cyber risk landscape, it becomes imperative to establish comprehensive compliances and regulations governing AI technologies. The insights garnered from studies like this are instrumental in shaping these regulations, pinpointing potential weak points and threats. This study can prompt organizations, industries, and governing bodies to reevaluate existing cybersecurity strategies and formulate innovative approaches to tackle the emerging challenges posed by AI-driven attacks.

In essence, the study casts a spotlight on the shadowy territory of AI-driven acoustic side-channel attacks, which can accurately pilfer passwords during online calls. While AI brings a spectrum of benefits, it simultaneously unveils vulnerabilities that necessitate a vigilant response. The responsibility to address these concerns stretches beyond individual users, demanding a collective effort from the cybersecurity community and policymakers. Ultimately, the study reinforces the urgency of establishing ethical AI guidelines and regulations that harness the power of AI while preemptively curbing potential misuses and cyber threats.

Total Views: 128Word Count: 456See All articles From Author

Add Comment

Technology, Gadget and Science Articles

1. Enhancing Worker Safety In Manufacturing With Ar/vr Training
Author: Akas

2. What Are The Hidden Benefits Of Silent Pods And Booths In Home Offices?
Author: Silent Pod

3. The Benefits Of Renting Silent Pods For Events And Temporary Needs!
Author: Silent Pod

4. How Metal 3d Printing Is Transforming Prototyping In India [updated 2025]
Author: Protomont technologies

5. How To Fix Pla Filament Getting Brittle: Essential Tips For 3d Printing Success
Author: Protomont technologies

6. How Can A Virtual Receptionist Help You?
Author: Eliza Garran

7. How Ask On Data Helps Businesses Tackle Complex Data Wrangling Challenges
Author: Vhelical

8. How Conversational Ai Is Transforming Business Communication And Efficiency
Author: Prarthana

9. Cybersecurity In 2025: Ai-powered Threats, Supply Chain Vulnerabilities, And Regulatory Pressures Take Center Stage
Author: Santhosh Jochim

10. Artificial Intelligence In The Future World
Author: SEO HUNTER

11. Integrating Nfc Readers Into Mobile Devices: Benefits And Challenges
Author: Sankalp Singh

12. What Is Vapt Penetration Test?
Author: Qualysec Technologies

13. Improve Delivery Speed By Web Scraping Quick Commerce Data
Author: Devil Brown

14. What Is Betfury Clone Script And How It Can Revolutionize Your Crypto Gambling Platform
Author: judemaxwell

15. What Are The Benefits Of Application Integration?
Author: goodcoders

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: