All the latest UK technology news, reviews and analysis

Google updates reCaptcha tool to beat the spambots

28 Oct 2013

Google has updated its reCaptcha platform with advanced authentication powers to help prevent increasingly sophisticated software bots from getting past its defences.

ReCaptcha is a web authentication tool designed to force web users to prove they are a person rather than a software bot by asking the user to enter the letters displayed in a distorted panel.  It is used by numerous sites to try and stop spam bots creating millions of fake accounts.

Vinay Shet, Google product manager for reCaptcha, announced the update in a post on Google's Blog, explaining the new features are based on research about how humans behave online in order to try and improve the tool's performance.

"The reCaptcha team has been performing extensive research and making steady improvements to learn how to better protect users from attackers. As a result, reCaptcha is now more adaptive and better-equipped to distinguish legitimate users from automated software," he wrote.

Shet said the new reCaptcha platform will add numeric elements and constant monitoring to the traditional text-based solution to make it even better at spotting automated bots (an example is below).

Recaptcha service

"The updated system uses advanced risk analysis techniques, actively considering the user's entire engagement with the Captcha - before, during and after they interact with it. That means that today the distorted letters serve less as a test of humanity and more as a medium of engagement to elicit a broad range of cues that characterise humans and bots," he said.

Use of numbers should stop even the most advanced bot faking its way through the test.

"Humans find numeric Captchas significantly easier to solve than those containing arbitrary text and achieve nearly perfect pass rates on them," Shet claimed. "So with our new system, you'll encounter Captchas that are a breeze to solve. Bots, however, won't even see them."

Bot machines and programmes have been a growing problem facing the security community. The bot machines are usually owned by criminal groups and are part of a wider botnet of enslaved systems. The botnets have been used by organised criminal groups for a variety of purposes, including click fraud and Bitcoin mining.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Alastair Stevenson

Alastair has worked as a reporter covering security and mobile issues at V3 since March 2012. Before entering the field of journalism Alastair had worked in numerous industries as both a freelance copy writer and artist.

View Alastair's Google+ profile

More on Systems Management
What do you think?
blog comments powered by Disqus

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?

Popular Threads

Powered by Disqus
Sony Xperia Z2 Tablet powered by Android KitKat 4.4

Sony Xperia Z2 Tablet video

We take a look at the lightweight, waterproof tablet

Updating your subscription status Loading

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery


iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

Software Development Manager (Agile, LAMP, MySQL, SDLC, Web)

Software Development Manager (Agile, LAMP, MySQL, SDLC...

C# .NET SQL Developer (.NET 4.5, MVC, JavaScript, SharePoint) L

C# .NET SQL Developer (.NET 4.5, MVC, JavaScript, SharePoint...

Developer / Analyst Programmer (C#, VB.NET, SQL, Sharepoint)

Developer / Analyst Programmer (C#, VB.NET, SQL, Sharepoint...

Infrastructure Support Analyst - Exchange 2010, Citrix XenApps, Projects, Prince2

Infrastructure Support Analyst – Exchange 2010, Citrix...
To send to more than one email address, simply separate each address with a comma.