Google Launches reCAPTCHA v3 – A New Way to Stop Bot Traffic

Google launches reCAPTCHA v3 which returns a score based on the action in the website, which help’s webmaster in protecting the site against both.

Google acquires reCAPTCHA in the year 2009, from the time of acquisition Google made a number of changes and continuously evolved its technology.

reCAPTCHA v1 – Shows a challenge distorted text and ask to type the text into a box.

reCAPTCHA v2 – Requires users to click on the checkbox indicating the user is not a robot.

reCAPTCHA v3 – Allows you to verify the interactions is legitimate or not without any user interaction.

With reCAPTCHA v3, Google introduced a new concept called “Action”—a tag and it doesn’t interrupt users.

Google recommended adding reCAPTCHA in multiple pages, it can identify the pattern of attackers more accurately by looking at the activities across different pages on your website.

With reCAPTCHA admin console, you can get a full overview of reCAPTCHA score distribution and a breakdown for the stats of the top 10 actions on your site reads Google blog post.

The Google reCAPTCHA v3provides you a list of suspicious user interaction and tells you the score.

Three Ways reCAPTCHA v3 Calculates Score

First, you can set a threshold that determines when a user is let through or when further verification needs to be done

Second, you can combine the score with your own signals that reCAPTCHA can’t access—such as user profiles or transaction histories.

Third, you can use the reCAPTCHA score as one of the signals to train your machine learning model to fight abuse.

If reCAPTCHA v3 returns the score 1.0 it is like a human interaction and 0.0 is likely a bot, it learns by seeing real traffic on your site.

Related Read

unCaptcha to Break reCaptcha System of Defense in 5.42 Seconds

Security Researcher Breaks Google’s ReCaptcha v2 using Google’s Own Tool

Guru baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Norway Recommends Replacing SSLVPN/WebVPN to Stop Cyber Attacks

A very important message from the Norwegian National Cyber Security Centre (NCSC) says that Secure Socket Layer/Transport Layer Security (SSL/TLS)…

2 days ago

New Linux Backdoor Attacking Linux Users Via Installation Packages

Linux is widely used in numerous servers, cloud infrastructure, and Internet of Things devices, which makes it an attractive target…

2 days ago

ViperSoftX Malware Uses Deep Learning Model To Execute Commands

ViperSoftX malware, known for stealing cryptocurrency information, now leverages Tesseract, an open-source OCR engine, to target infected systems, which extracts…

2 days ago

Santander Data Breach: Hackers Accessed Company Database

Santander has confirmed that there was a major data breach that affected its workers and customers in Spain, Uruguay, and…

2 days ago

U.S. Govt Announces Rewards up to $5 Million for North Korean IT Workers

The U.S. government has offered a prize of up to $5 million for information that leads to the arrest and…

2 days ago

Russian APT Hackers Attacking Critical Infrastructure

Russia leverages a mix of state-backed Advanced Persistent Threat (APT) groups and financially motivated cybercriminals to achieve its strategic goals,…

2 days ago