Google Launches reCAPTCHA v3 – A New Way to Stop Bot Traffic

Google launches reCAPTCHA v3 which returns a score based on the action in the website, which help’s webmaster in protecting the site against both.

Google acquires reCAPTCHA in the year 2009, from the time of acquisition Google made a number of changes and continuously evolved its technology.

reCAPTCHA v1 – Shows a challenge distorted text and ask to type the text into a box.

reCAPTCHA v2 – Requires users to click on the checkbox indicating the user is not a robot.

reCAPTCHA v3 – Allows you to verify the interactions is legitimate or not without any user interaction.

With reCAPTCHA v3, Google introduced a new concept called “Action”—a tag and it doesn’t interrupt users.

Google recommended adding reCAPTCHA in multiple pages, it can identify the pattern of attackers more accurately by looking at the activities across different pages on your website.

With reCAPTCHA admin console, you can get a full overview of reCAPTCHA score distribution and a breakdown for the stats of the top 10 actions on your site reads Google blog post.

The Google reCAPTCHA v3provides you a list of suspicious user interaction and tells you the score.

Three Ways reCAPTCHA v3 Calculates Score

First, you can set a threshold that determines when a user is let through or when further verification needs to be done

Second, you can combine the score with your own signals that reCAPTCHA can’t access—such as user profiles or transaction histories.

Third, you can use the reCAPTCHA score as one of the signals to train your machine learning model to fight abuse.

If reCAPTCHA v3 returns the score 1.0 it is like a human interaction and 0.0 is likely a bot, it learns by seeing real traffic on your site.

Related Read

unCaptcha to Break reCaptcha System of Defense in 5.42 Seconds

Security Researcher Breaks Google’s ReCaptcha v2 using Google’s Own Tool

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Beware Of SpyLoan Apps Exploits Social Engineering To Steal User Data

SpyLoan apps, a type of PUP, are rapidly increasing, exploiting social engineering to deceive users…

2 hours ago

Researchers Detailed Tools Used By Hacktivists Fueling Ransomware Attacks

CyberVolk, a politically motivated hacktivist group, has leveraged readily available ransomware builders like AzzaSec, Diamond,…

2 hours ago

Blue Yonder Ransomware Attack Impacts Starbucks & Multiple Supermarkets

A ransomware attack on Blue Yonder, a leading supply chain management software provider, has created…

4 hours ago

Dell Wyse Management Suite Vulnerabilities Let Attackers Exploit Affected Systems Remotely

Dell Technologies has released a security update for its Wyse Management Suite (WMS) to address…

4 hours ago

CISA Details Red Team Assessment Including TTPs & Network Defense

The Cybersecurity and Infrastructure Security Agency (CISA) recently detailed findings from a Red Team Assessment…

4 hours ago

IBM Workload Scheduler Vulnerability Stores User Credentials in Plain Text

IBM has issued a security bulletin warning customers about a vulnerability in its Workload Scheduler…

5 hours ago