Feeds

Video CAPTCHAs target cyberbaddies

Animated Turing tests

High performance access to file storage

NuCaptcha has extended its video-based CAPTCHA service that it claims will make things easier for users while making life more difficult for spammers and other cyber-baddies.

The technology, which is customisable, involves asking users to identify moving text in an animation against a video background. NuCaptcha is positioned the technology as an alternative to traditional distorted text-based Captchas from the likes of Google and others.

The software is available in free, ad-supported or paid-for enterprise formats featuring varying levels of complexity, refinement and security, as explained in a short (but somewhat cheesy) video clip here.

The Canadian start-up began offering NuCaptcha Basic, a freemium security service for websites and blogs that offers up to 25,000 CAPTCHAs per month, last year. It extended this portfolio with ad-supported, enterprise and branded versions of the product on Thursday, alongside a campaign designed to encourage webmaster to make the switch.

Applications include everything from website sign-ups for the free product, to challenge screens for corporate password resets for the enterprise product.

The system is designed to detect unusual behaviour, increasing the complexity of the CAPTCHA while slowing down the video. The approach is designed to make it difficult for both bots and human-farms to solve CAPTCHAs in high volumes.

The CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) has been used for years to prevent automated sign-ups to webmail accounts and the like. Users are typically asked to identify distorted letters as depicted in an image, although a variety of other approaches – including pictures of cats and calculus puzzles – have been applied to the problem.

Cybercrooks have responded to the challenge by devising techniques to circumvent controls, for example by creating ready-to-spam webmail accounts from established providers that are less likely to be blocked by basic anti-spam filters.

Sign-up for new accounts can be automated, but solving the CAPTCHA puzzles themselves is normally farmed out to the human cogs in 21st century sweatshops, often based in India, where worker drones are paid as little as $4 a day to defeat security checks. ®

High performance access to file storage

More from The Register

next story
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
Bad PUPPY: Undead Windows XP deposits fresh scamware on lawn
Installing random interwebs shiz will bork your zombie box
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.