Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

High-resolution computer mice can listen to conversations through desk vibrations

UC Irvine researchers found that high-resolution optical mice can detect desk vibrations and reconstruct speech, exposing a surprising privacy risk where standard computer peripherals could act as unintended listening devices.

byEmre Çıtak
October 6, 2025
in Research, Cybersecurity

Researchers at the University of California, Irvine have discovered a potential security vulnerability, demonstrating that high-resolution optical computer mice can detect and translate desk vibrations into understandable speech, creating an unexpected acoustic privacy risk.

The project, named Mic-E-Mouse, reveals how a standard computer peripheral can be repurposed into an unintended listening device. High-performance optical mice, especially those with resolutions of 20,000 dpi and rapid polling rates, are sensitive enough to capture microscopic surface vibrations. While these features are designed to enhance precision for gaming or graphic design, the research team found they could be used for a more invasive purpose.

How the vulnerability works

When a mouse is on a desk while someone is speaking, the vibrations from their voice travel through the desk surface and are picked up by the mouse’s optical sensor. A computer running software with access to the raw sensor data can then collect and analyze these tiny movements.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

The process involves several technical steps:

  1. Extracting the raw motion data packets from the mouse.
  2. Isolating the specific vibrations related to human speech.
  3. Applying advanced digital signal processing techniques to clean up the signal.

The researchers used a Wiener filter to remove background noise and then employed a neural network model to reconstruct the acoustic waveform with greater clarity. In their tests, this method achieved speech recognition accuracy between 42% and 61%, making significant portions of conversations intelligible.

The potential for exploitation

A critical aspect of this vulnerability is that it does not require complex malware to be installed on a system. Any legitimate application that requests high-frequency mouse data, if compromised, could potentially be used to exploit this weakness. Once the acoustic data is captured, it can be transmitted to an external location, allowing for the covert interception of sensitive conversations without being detected.


Featured image credit

Tags: FeaturedMouse DPIUCI

Related Posts

Google’s Live Threat Detection is reportedly coming to more Android phones

Google’s Live Threat Detection is reportedly coming to more Android phones

October 23, 2025
Meta’s latest update focuses on protecting older users from scams

Meta’s latest update focuses on protecting older users from scams

October 22, 2025
US judge bans NSO Group from targeting WhatsApp users with Pegasus spyware

US judge bans NSO Group from targeting WhatsApp users with Pegasus spyware

October 21, 2025
Cyberattacks are now killing patients not just crashing systems

Cyberattacks are now killing patients not just crashing systems

October 21, 2025
AWS outage: A complete list of every site and app that went down

AWS outage: A complete list of every site and app that went down

October 20, 2025
Gen Z workers are telling AI things they’ve never told a human

Gen Z workers are telling AI things they’ve never told a human

October 20, 2025

LATEST NEWS

OpenAI adds scheduling powers to ChatGPT with new Tasks feature

Instagram adds watch history for Reels on Android and iOS

Huawei: Quad-foldable phone is possible in 2026

Watch: SpaceX launches 84 more Starlink satellites in three Falcon 9 missions over 4 days

Mistral AI takes on Google with enterprise AI Studio

Gemini can now generate full presentations from text or files

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.