Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

High-resolution computer mice can listen to conversations through desk vibrations

UC Irvine researchers found that high-resolution optical mice can detect desk vibrations and reconstruct speech, exposing a surprising privacy risk where standard computer peripherals could act as unintended listening devices.

byEmre Çıtak
October 6, 2025
in Research, Cybersecurity

Researchers at the University of California, Irvine have discovered a potential security vulnerability, demonstrating that high-resolution optical computer mice can detect and translate desk vibrations into understandable speech, creating an unexpected acoustic privacy risk.

The project, named Mic-E-Mouse, reveals how a standard computer peripheral can be repurposed into an unintended listening device. High-performance optical mice, especially those with resolutions of 20,000 dpi and rapid polling rates, are sensitive enough to capture microscopic surface vibrations. While these features are designed to enhance precision for gaming or graphic design, the research team found they could be used for a more invasive purpose.

How the vulnerability works

When a mouse is on a desk while someone is speaking, the vibrations from their voice travel through the desk surface and are picked up by the mouse’s optical sensor. A computer running software with access to the raw sensor data can then collect and analyze these tiny movements.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

The process involves several technical steps:

  1. Extracting the raw motion data packets from the mouse.
  2. Isolating the specific vibrations related to human speech.
  3. Applying advanced digital signal processing techniques to clean up the signal.

The researchers used a Wiener filter to remove background noise and then employed a neural network model to reconstruct the acoustic waveform with greater clarity. In their tests, this method achieved speech recognition accuracy between 42% and 61%, making significant portions of conversations intelligible.

The potential for exploitation

A critical aspect of this vulnerability is that it does not require complex malware to be installed on a system. Any legitimate application that requests high-frequency mouse data, if compromised, could potentially be used to exploit this weakness. Once the acoustic data is captured, it can be transmitted to an external location, allowing for the covert interception of sensitive conversations without being detected.


Featured image credit

Tags: FeaturedMouse DPIUCI

Related Posts

Fight for the Future launches campaign to protect VPN access

Fight for the Future launches campaign to protect VPN access

October 6, 2025
Yubico survey: 62% of Gen Z engaged with phishing scams

Yubico survey: 62% of Gen Z engaged with phishing scams

October 6, 2025
Could CTEM have prevented the Oracle Cloud breach?

Could CTEM have prevented the Oracle Cloud breach?

October 5, 2025
Researchers make breakthrough in semiconductor technology set to supercharge 6G

Researchers make breakthrough in semiconductor technology set to supercharge 6G

October 3, 2025
Light-powered chip makes AI computation 100 times more efficient

Light-powered chip makes AI computation 100 times more efficient

October 3, 2025
Free and effective anti-robocall tools are now available

Free and effective anti-robocall tools are now available

October 3, 2025

LATEST NEWS

Leaked real-world photos show Huawei Mate 80 series design

Snapchat Memories limits free storage to 5 GB

OpenAI Sora 2 requires opt-in for Nintendo, Pokémon content

OpenAI and Jony Ive developing new AI device, report details challenges

Microsoft warns of critical vulnerability as Windows 10 support deadline nears

OpenAI Agent Builder debuts with drag-and-drop workflows

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.