Google launches reCAPTCHA v3 which returns a score based on the action in the website, which help’s webmaster in protecting the site against both.
Google acquires reCAPTCHA in the year 2009, from the time of acquisition Google made a number of changes and continuously evolved its technology.
reCAPTCHA v1 – Shows a challenge distorted text and ask to type the text into a box.
reCAPTCHA v2 – Requires users to click on the checkbox indicating the user is not a robot.
reCAPTCHA v3 – Allows you to verify the interactions is legitimate or not without any user interaction.
With reCAPTCHA v3, Google introduced a new concept called “Action”—a tag and it doesn’t interrupt users.
Google recommended adding reCAPTCHA in multiple pages, it can identify the pattern of attackers more accurately by looking at the activities across different pages on your website.
With reCAPTCHA admin console, you can get a full overview of reCAPTCHA score distribution and a breakdown for the stats of the top 10 actions on your site reads Google blog post.
The Google reCAPTCHA v3provides you a list of suspicious user interaction and tells you the score.
First, you can set a threshold that determines when a user is let through or when further verification needs to be done
Second, you can combine the score with your own signals that reCAPTCHA can’t access—such as user profiles or transaction histories.
Third, you can use the reCAPTCHA score as one of the signals to train your machine learning model to fight abuse.
If reCAPTCHA v3 returns the score 1.0 it is like a human interaction and 0.0 is likely a bot, it learns by seeing real traffic on your site.
unCaptcha to Break reCaptcha System of Defense in 5.42 Seconds
Security Researcher Breaks Google’s ReCaptcha v2 using Google’s Own Tool
The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network infrastructure…
The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted on…
Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into unsuspecting…
Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network edge…
Joining Criminal IP at Booth S-634 | South Expo, Moscone Center | April 28 –…
Cybersecurity researchers have uncovered critical SQL injection vulnerabilities in four TP-Link router models, enabling attackers…