Saturday, January 11, 2025
HomeCyber Security NewsGoogle Launches reCAPTCHA v3 - A New Way to Stop Bot Traffic

Google Launches reCAPTCHA v3 – A New Way to Stop Bot Traffic

Published on

Google launches reCAPTCHA v3 which returns a score based on the action in the website, which help’s webmaster in protecting the site against both.

Google acquires reCAPTCHA in the year 2009, from the time of acquisition Google made a number of changes and continuously evolved its technology.

reCAPTCHA v1 – Shows a challenge distorted text and ask to type the text into a box.

reCAPTCHA v2 – Requires users to click on the checkbox indicating the user is not a robot.

reCAPTCHA v3 – Allows you to verify the interactions is legitimate or not without any user interaction.

With reCAPTCHA v3, Google introduced a new concept called “Action”—a tag and it doesn’t interrupt users.

Google recommended adding reCAPTCHA in multiple pages, it can identify the pattern of attackers more accurately by looking at the activities across different pages on your website.

With reCAPTCHA admin console, you can get a full overview of reCAPTCHA score distribution and a breakdown for the stats of the top 10 actions on your site reads Google blog post.

The Google reCAPTCHA v3provides you a list of suspicious user interaction and tells you the score.

Three Ways reCAPTCHA v3 Calculates Score

First, you can set a threshold that determines when a user is let through or when further verification needs to be done

Second, you can combine the score with your own signals that reCAPTCHA can’t access—such as user profiles or transaction histories.

Third, you can use the reCAPTCHA score as one of the signals to train your machine learning model to fight abuse.

If reCAPTCHA v3 returns the score 1.0 it is like a human interaction and 0.0 is likely a bot, it learns by seeing real traffic on your site.

reCAPTCHA v3

Related Read

unCaptcha to Break reCaptcha System of Defense in 5.42 Seconds

Security Researcher Breaks Google’s ReCaptcha v2 using Google’s Own Tool

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the...

Weaponized LDAP Exploit Deploys Information-Stealing Malware

Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake...

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files

A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has...

Hackers Targeting Users Who Lodged Complaints On Government portal To Steal Credit Card Data

Fraudsters in the Middle East are exploiting a vulnerability in the government services portal....

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the...

Weaponized LDAP Exploit Deploys Information-Stealing Malware

Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake...

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files

A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has...