Close Menu
New York Examiner News

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Slipknot’s Clown Addresses Status of Next Album

    January 17, 2026

    Elon Musk’s Boring Co. is studying a tunnel project to Tesla Gigafactory near Reno

    January 17, 2026

    Democrats Won’t Allow Trump To Rig The Midterm As They Take A Big Step Toward Redistricting In Virginia

    January 17, 2026
    Facebook X (Twitter) Instagram
    New York Examiner News
    • Home
    • US News
    • Politics
    • Business
    • Science
    • Technology
    • Lifestyle
    • Music
    • Television
    • Film
    • Books
    • Contact
      • About
      • Amazon Disclaimer
      • DMCA / Copyrights Disclaimer
      • Terms and Conditions
      • Privacy Policy
    New York Examiner News
    Home»Technology»A New Attack Reveals Everything You Type With 95 Percent Accuracy
    Technology

    A New Attack Reveals Everything You Type With 95 Percent Accuracy

    By AdminAugust 13, 2023
    Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    A New Attack Reveals Everything You Type With 95 Percent Accuracy


    Of course, generative AI tools are the talk of the security industry this year. And Microsoft is no exception. In fact, since 2018, the company has had an AI red team that attacks AI tools to find vulnerabilities and help prevent them from behaving badly.

    Outside of Black Hat and Defcon coverage, we detailed the ins and outs of the data privacy that HIPPA provides people in the US, and explained how to use Google’s new “Results About You” tool to get your personal information removed from search results.

    But that’s not all. Each week, we round up the security news that we didn’t cover in depth ourselves. Click on the headlines to read the full stories. And stay safe out there.

    Your keyboard may be exposing your secrets without you even knowing it. Researchers in the UK developed a deep-learning algorithm that can figure out what a person is typing just by listening to keystrokes. In a best-case scenario (for an attacker, that is), the algorithm is 95 percent accurate. The researchers even tested it over Zoom and found it performed with 93 percent accuracy.

    Now, if you’re thinking the researchers tested the attack on the noisiest mechanical keyboard they could find, you’d be wrong. They performed their tests on a MacBook Pro. And the attack doesn’t even require fancy recording equipment—a phone’s microphone works just fine. Someone who successfully carries out the attack could use it to learn a target’s passwords or snoop on their conversations. These kinds of acoustic attacks aren’t new, but this research shows they’re getting frighteningly accurate and easier to pull off in the wild.

    A series of data breaches rocked the United Kingdom this week. On August 8, the Electoral Commission, the independent body responsible for overseeing elections and regulating political finances, revealed a cyberattack had exposed the data of 40 million voters to hackers. The organization has been unable to determine whether data was taken; however, it says that full names, emails, phone numbers, home addresses, and data provided during contact with the body could be impacted. “The attack has not had an impact on the electoral process,” the commission said. (Elections are run by local councils.)

    The commission has, however, been criticized for how it communicated the cyberattack: The incident happened in August 2021 but was detected only in October 2022, and then finally communicated to the public nine months later. It has also been reported the breach may be linked to an unpatched Microsoft Exchange zero-day.

    But that wasn’t all. The same day, the Police Service of Northern Ireland (PSNI) accidentally published the names and roles of 10,000 officers and staff in response to a Freedom of Information request. The breach, arguably, has more significant ramifications than that of the Electoral Commission. Officers working in intelligence and security services were included in the breach, which stayed online for three hours. The PSNI blamed “human error” for the breach, and the British data regulator, the Information Commissioner’s Office, has opened an investigation. (Previously, the regulator has issued guidance on making sure information is not accidentally disclosed via spreadsheets.) Since the breach, officers have expressed concerns about their safety, and the police service has been reviewing moving people to different roles for safety reasons.

    North Korean hackers don’t just steal cryptocurrency, they also may have stolen Russia’s missile secrets. According to Reuters, the state-linked hacking group Lazarus breached the networks of NPO Mashinostroyeniya, a major Russian missile manufacturer, in late 2021. The breach wasn’t detected until May 2022. A researcher with the cybersecurity firm SentinelOne who discovered the breach said that the hackers would have had “the ability to read email traffic, jump between networks, and extract data,” Reuters reports.

    It is unclear what exactly the Lazarus hackers stole while inside the NPO network, although North Korea did announce several updates to its missile program following the breach, so the two may be linked.

    Last month, Microsoft revealed damning news: China-based hackers stole a digital key that the company uses to cryptographically sign tokens that are assigned to users when they log in to their Outlook email accounts. The hackers used this stunning access to break into the Outlook accounts of at least 25 organizations, including government bodies. But that’s only the start of the problems for Microsoft.

    US senator Ron Wyden, an Oregon Democrat, sent a letter this week demanding three federal inquiries into Microsoft’s “negligent cybersecurity practices,” The Wall Street Journal reports. Wyden also asked that the Cyber Safety Review Board, which the Biden administration created to investigate cybersecurity incidents, also look into the incident. And according to Bloomberg News, the review board is already planning to do just that.

    Wyden’s letter, which is dated July 27, demands that the Department of Justice, the Federal Trade Commission, and the Cybersecurity and Infrastructure Security Agency all launch investigations. Microsoft, for its part, tells the Journal that it plans to fully cooperate with any federal inquiries into the hack.



    Original Source Link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Previous ArticleHow Wildfires Kill People – Scientific American
    Next Article ‘Like A War Zone’: 4 Dead, 1 Missing After House Explosion In Western Pennsylvania

    RELATED POSTS

    AI cloud startup Runpod hits $120M in ARR — and it started with a Reddit post  

    January 17, 2026

    Ads Are Coming to ChatGPT. Here’s How They’ll Work

    January 16, 2026

    Silicon Valley’s messiest breakup is definitely headed to court

    January 16, 2026

    Why ICE Can Kill With Impunity

    January 15, 2026

    Mira Murati’s startup, Thinking Machines Lab, is losing two of its co-founders to OpenAI

    January 15, 2026

    AI’s Hacking Skills Are Approaching an ‘Inflection Point’

    January 14, 2026
    latest posts

    Slipknot’s Clown Addresses Status of Next Album

    It’s been a little while since Slipknot released their last original album and percussionist and…

    Elon Musk’s Boring Co. is studying a tunnel project to Tesla Gigafactory near Reno

    January 17, 2026

    Democrats Won’t Allow Trump To Rig The Midterm As They Take A Big Step Toward Redistricting In Virginia

    January 17, 2026

    Minnesota judge bars federal officers from tear gas on peaceful protesters

    January 17, 2026

    AI cloud startup Runpod hits $120M in ARR — and it started with a Reddit post  

    January 17, 2026

    RFK, Jr., shifts focus to questioning whether cell phones are safe. Here’s what the science says

    January 17, 2026

    Next ‘Paranormal Activity’ Movie Lands Summer 2027 Date

    January 17, 2026
    Categories
    • Books (1,006)
    • Business (5,911)
    • Events (29)
    • Film (5,847)
    • Lifestyle (3,957)
    • Music (5,948)
    • Politics (5,912)
    • Science (5,262)
    • Technology (5,841)
    • Television (5,525)
    • Uncategorized (6)
    • US News (5,899)
    popular posts

    Microsoft’s New Majorana 1 Processor Could Transform Quantum Computing

    THIS ARTICLE IS republished from The Conversation under a Creative Commons license.Researchers at Microsoft have…

    AOC Slapped With House Ethics Investigation, But Team is ‘Confident’ It’ll Be Dismissed

    December 9, 2022

    Amazon’s Prime Day recap missing usual key metric

    July 15, 2025

    Overturning Roe v Wade would be a disaster for public health

    May 26, 2022
    Archives
    Browse By Category
    • Books (1,006)
    • Business (5,911)
    • Events (29)
    • Film (5,847)
    • Lifestyle (3,957)
    • Music (5,948)
    • Politics (5,912)
    • Science (5,262)
    • Technology (5,841)
    • Television (5,525)
    • Uncategorized (6)
    • US News (5,899)
    About Us

    We are a creativity led international team with a digital soul. Our work is a custom built by the storytellers and strategists with a flair for exploiting the latest advancements in media and technology.

    Most of all, we stand behind our ideas and believe in creativity as the most powerful force in business.

    What makes us Different

    We care. We collaborate. We do great work. And we do it with a smile, because we’re pretty damn excited to do what we do. If you would like details on what else we can do visit out Contact page.

    Our Picks

    RFK, Jr., shifts focus to questioning whether cell phones are safe. Here’s what the science says

    January 17, 2026

    Next ‘Paranormal Activity’ Movie Lands Summer 2027 Date

    January 17, 2026

    ‘90 Day Fiance’ Big Ed Brown & Rose Vega Reconcile?

    January 17, 2026
    © 2026 New York Examiner News. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms & Conditions and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT