Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

High-resolution computer mice can listen to conversations through desk vibrations

UC Irvine researchers found that high-resolution optical mice can detect desk vibrations and reconstruct speech, exposing a surprising privacy risk where standard computer peripherals could act as unintended listening devices.

byEmre Çıtak
October 6, 2025
in Research, Cybersecurity
Home Research
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

Researchers at the University of California, Irvine have discovered a potential security vulnerability, demonstrating that high-resolution optical computer mice can detect and translate desk vibrations into understandable speech, creating an unexpected acoustic privacy risk.

The project, named Mic-E-Mouse, reveals how a standard computer peripheral can be repurposed into an unintended listening device. High-performance optical mice, especially those with resolutions of 20,000 dpi and rapid polling rates, are sensitive enough to capture microscopic surface vibrations. While these features are designed to enhance precision for gaming or graphic design, the research team found they could be used for a more invasive purpose.

How the vulnerability works

When a mouse is on a desk while someone is speaking, the vibrations from their voice travel through the desk surface and are picked up by the mouse’s optical sensor. A computer running software with access to the raw sensor data can then collect and analyze these tiny movements.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

The process involves several technical steps:

  1. Extracting the raw motion data packets from the mouse.
  2. Isolating the specific vibrations related to human speech.
  3. Applying advanced digital signal processing techniques to clean up the signal.

The researchers used a Wiener filter to remove background noise and then employed a neural network model to reconstruct the acoustic waveform with greater clarity. In their tests, this method achieved speech recognition accuracy between 42% and 61%, making significant portions of conversations intelligible.

The potential for exploitation

A critical aspect of this vulnerability is that it does not require complex malware to be installed on a system. Any legitimate application that requests high-frequency mouse data, if compromised, could potentially be used to exploit this weakness. Once the acoustic data is captured, it can be transmitted to an external location, allowing for the covert interception of sensitive conversations without being detected.


Featured image credit

Tags: FeaturedMouse DPIUCI

Related Posts

Nature study projects 2B wearable health devices by 2050

Nature study projects 2B wearable health devices by 2050

January 7, 2026
DeepSeek introduces Manifold-Constrained Hyper-Connections for R2

DeepSeek introduces Manifold-Constrained Hyper-Connections for R2

January 6, 2026
Imperial College London develops AI to accelerate cardiac drug discovery

Imperial College London develops AI to accelerate cardiac drug discovery

January 5, 2026
DarkSpectre malware infects 8.8 million users via browser extensions

DarkSpectre malware infects 8.8 million users via browser extensions

January 2, 2026
CMU researchers develop self-moving objects powered by AI

CMU researchers develop self-moving objects powered by AI

December 31, 2025
Glean’s Work AI Institute identifies 5 core AI tensions

Glean’s Work AI Institute identifies 5 core AI tensions

December 31, 2025

LATEST NEWS

Xbox Developer Direct returns January 22 with Fable and Forza Horizon 6

Dell debuts disaggregated infrastructure for modern data centers

TikTok scores partnership with FIFA for World Cup highlights

YouTube now lets you hide Shorts in search results

Google transforms Gmail with AI Inbox and natural language search

Disney+ to launch TikTok-style short-form video feed in the US

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI tools
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.