Показать сообщение отдельно

Google's CAPTCHA Is Broken
  #1  
Старый 03.10.2008, 01:57
Fugitif
Постоянный
Регистрация: 23.09.2007
Сообщений: 416
С нами: 9806786

Репутация: 869
По умолчанию Google's CAPTCHA Is Broken

Цитата:
"Yesterday it was reported that Microsoft's revised CAPTCHA had been cracked. Now it's Google's turn. In a move that is sure to surprise no one, the spammers behind 'Xrumer' have announced that they've not only cracked Google's CAPTCHA, but other forms of image verification as well, including 'pick the cat' style CAPTCHA."
More About:

http://it.slashdot.org/article.pl?sid=08/10/02/1415205

Xrumer 5.0a - Google Captcha Cracked!
Цитата:
XRumer is a Windows program that posts forum, blog, private message, and guestbook spam with the aim of boosting search engine rankings. It is able to bypass techniques commonly used by many websites to deter automated spam, such as account registration, CAPTCHAs, and e-mail activation before posting, however the older versions still had trouble with 'fancier' CAPTCHA. Not anymore.

This time those evil Russian bastards have not only managed to crack Googles captcha, but they've also figure out how to beat those horrible 'click on the cutest cat' style CAPTCHA tests. It's amazing!
Microsoft Live Hotmail Under Attack by Streamlined Anti-CAPTCHA and Mass-mailing Operations
Цитата:
Websense Security Labs ThreatSeeker™ technology has discovered that spammers in their recent tactics have drawn their attention towards traditional and infamous Hotmail, aka Live Hotmail services after the streamlined Live Mail Anti-CAPTCHA operations. Spammers have managed to create automated bots that are capable of not only signing up and creating random Hotmail accounts, but also use these accounts for spamming purposes from a proper Live Hotmail service. Websense predictions about this sophisticated spammer strategy at the time of Live Mail Anti-CAPTCHA and Gmail Anti-CAPTCHA operations, and its outcomes have been factual with this attack.

http://securitylabs.websense.com/con...logs/3063.aspx
 
Ответить с цитированием