CYBERSECURITY experts warn about ‘acoustic side-channeling attacks’ that can be used to spy on you.

In a new blog post by cybersecurity firm Kaspersky, experts detail the dangers of sophisticated AI being used to spy on users via typing.

Experts warn about 'acoustic side-channeling attacks' that can be used to spy on you

1

Experts warn about ‘acoustic side-channeling attacks’ that can be used to spy on youCredit: Getty

This is known as an “acoustic side-channel attack” (ASCA) and they use sound to glean information from a system.

HOW DO ACOUSTIC SIDE-CHANNEL ATTACKS WORK?

This attack relies on the sounds produced by typing on a keyboard to determine what is being typed.

By analyzing these unique sounds, hackers with the right equipment can decode the exact letters being pressed.

ASCAs are another type of side-channel attack, which means they exploit unintended channels of information leakage in a system.

Side-channel attacks are dangerous because they target indirect channels like power consumption, electromagnetic emissions, or, in this case, sound.

A few months ago, a research paper titled “A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards”, revealed that AI could be used in ASCAs.

Specifically, AI could be used to decode passwords by analyzing the sound produced by keystrokes.

Researchers found that when the AI model was trained to recognize keystrokes, it was able to identify letters with 95% accuracy.

Most read in News Tech

THE RISKS

The most obvious risk of ASCAs is a hacker’s ability to gain access to your sensitive information such as passwords or usernames.

If a threat actor gains this data, they can use it to hack into your online accounts or even your bank.

YouTuber finds her AI clone on the internet begging for a Chinese husband…& promising to do all the cooking and cleaning

They could also steal important data to commit identity fraud or other crimes in your name.

This new technology is worrying cybersecurity experts and smartphone users alike.

“When we enter a credit card number or password, we can hide the keyboard from prying eyes, but protecting yourself from eavesdropping isn’t so easy,” Kaspersky writes in its blog post.

“It’s not quite there yet, but imagine someone in a café or on the train potentially stealing your password, credit card number, or even your private messages just by listening to you typing,” the blog continues.

Deepfakes – what are they, and how do they work?

Here’s what you need to know…

  • Deepfakes are phoney videos of people that look perfectly real
  • They’re made using computers to generate convincing representations of events that never happened
  • Often, this involves swapping the face of one person onto another, or making them say whatever you want
  • The process begins by feeding an AI hundreds or even thousands of photos of the victim
  • A machine learning algorithm swaps out certain parts frame-by-frame until it spits out a realistic, but fake, photo or video
  • In one famous deepfake clip, comedian Jordan Peele created a realistic video of Barack Obama in which the former President called Donald Trump a “dipsh*t”
  • In another, the face of Will Smith is pasted onto the character of Neo in the action flick The Matrix. Smith famously turned down the role to star in flop movie Wild Wild West, while the Matrix role went to Keanu Reeves

HOW TO STAY SAFE

It can be hard to protect yourself from such attacks, especially if the technology is only evolving.

However, Kaspersky noted some tips that could help users stay safe.

For starters, avoid typing passwords or other secret information during conference calls, Kaspersky experts said.

“For many reasons, we recommend using two-factor authentication — it protects well against various password compromise scenarios,” it added.

2FA protects your accounts by requiring an extra level of verification before logging in – such as a text confirmation.

“Finally, there’s a way to counteract this specific side-channel attack. It’s based on the fact that you have a certain consistent pattern of typing on the keyboard,” Kaspersky noted.

READ MORE SUN STORIES

“Want to make it harder for those sneaky hackers? Break the pattern: mix up your typing style,” it continued.

“Both super-slow and super-fast typing can work wonders.”

This post first appeared on Thesun.co.uk

You May Also Like

Currys adds Xbox Series X stock after console sold out worldwide – how to get one

UK retailer Currys has restocked the in-demand Xbox Series X. Sales of…

Apple’s ‘One More Thing’ for 2020: A $549 Pair of Headphones

Apple just released a new pair of AirPods—though “pods” is a misnomer.…

Breathe Easy—We Found the Best Air Purifiers

Your home is now your work place, playground, meditation studio, dine-in restaurant,…

Pickup truck-sized ASTEROID came less than 250 miles from hitting Earth, Nasa reveals

AN ASTEROID the size of a pick-up truck has just skirted within…