Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

High-resolution computer mice can listen to conversations through desk vibrations

UC Irvine researchers found that high-resolution optical mice can detect desk vibrations and reconstruct speech, exposing a surprising privacy risk where standard computer peripherals could act as unintended listening devices.

byEmre Çıtak
October 6, 2025
in Research, Cybersecurity
Home Research
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

Researchers at the University of California, Irvine have discovered a potential security vulnerability, demonstrating that high-resolution optical computer mice can detect and translate desk vibrations into understandable speech, creating an unexpected acoustic privacy risk.

The project, named Mic-E-Mouse, reveals how a standard computer peripheral can be repurposed into an unintended listening device. High-performance optical mice, especially those with resolutions of 20,000 dpi and rapid polling rates, are sensitive enough to capture microscopic surface vibrations. While these features are designed to enhance precision for gaming or graphic design, the research team found they could be used for a more invasive purpose.

How the vulnerability works

When a mouse is on a desk while someone is speaking, the vibrations from their voice travel through the desk surface and are picked up by the mouse’s optical sensor. A computer running software with access to the raw sensor data can then collect and analyze these tiny movements.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

The process involves several technical steps:

  1. Extracting the raw motion data packets from the mouse.
  2. Isolating the specific vibrations related to human speech.
  3. Applying advanced digital signal processing techniques to clean up the signal.

The researchers used a Wiener filter to remove background noise and then employed a neural network model to reconstruct the acoustic waveform with greater clarity. In their tests, this method achieved speech recognition accuracy between 42% and 61%, making significant portions of conversations intelligible.

The potential for exploitation

A critical aspect of this vulnerability is that it does not require complex malware to be installed on a system. Any legitimate application that requests high-frequency mouse data, if compromised, could potentially be used to exploit this weakness. Once the acoustic data is captured, it can be transmitted to an external location, allowing for the covert interception of sensitive conversations without being detected.


Featured image credit

Tags: FeaturedMouse DPIUCI

Related Posts

Light powered tensor computing could upend how AI hardware works

Light powered tensor computing could upend how AI hardware works

November 17, 2025
Japan researchers simulate Milky Way with 100 billion stars using AI

Japan researchers simulate Milky Way with 100 billion stars using AI

November 17, 2025
Chinese hackers use Claude to run large scale cyberespionage

Chinese hackers use Claude to run large scale cyberespionage

November 14, 2025
Hackers exploit Cisco and Citrix zero days to gain admin access

Hackers exploit Cisco and Citrix zero days to gain admin access

November 13, 2025
Google reveals AI-powered malware using LLMs in real time

Google reveals AI-powered malware using LLMs in real time

November 12, 2025
Oxford study finds AI benchmarks often exaggerate model performance

Oxford study finds AI benchmarks often exaggerate model performance

November 12, 2025

LATEST NEWS

Falcon 9’s 500th reflown launch sets the stage for Starlink’s V3 ambitions

A reporter let AI agents run a fake company and chaos followed

Samsung’s tri-fold phone looks almost ready for its US debut

Apple plans spring launch for base iPhone 18 and new iPhone 18e

Anthropic CEO warns rising AI autonomy poses critical risks

Apple halts Mac Pro development and ends M4 Ultra plans

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.