Tagged articles
2 articles
Page 1 of 1
21CTO
21CTO
Aug 15, 2023 · Information Security

Can Your Keyboard’s Sound Leak Your Password? AI‑Powered Acoustic Eavesdropping

A recent UK study demonstrates that a deep‑learning model can analyze audio recordings of keystrokes—captured via microphones or video‑call platforms like Zoom—to infer typed characters with up to 95 % accuracy, highlighting a serious acoustic side‑channel threat to passwords and other sensitive information.

acoustic side-channelaudio eavesdroppinginformation security
0 likes · 4 min read
Can Your Keyboard’s Sound Leak Your Password? AI‑Powered Acoustic Eavesdropping
21CTO
21CTO
Aug 13, 2017 · Information Security

How Researchers Root Amazon Echo to Turn It Into a Stealthy Audio Spy

Security researchers discovered a physical attack vector on Amazon Echo that exposes its debug panel and allows booting from an external SD card, enabling persistent root access, covert audio streaming, and a full remote control backdoor, with detailed hardware and firmware exploitation steps provided.

Amazon EchoRoot Accessaudio eavesdropping
0 likes · 11 min read
How Researchers Root Amazon Echo to Turn It Into a Stealthy Audio Spy