A three-year-old attack technique to bypass Google's audio reCAPTCHA by using its own Speech-to-Text API has been found to still work with 97% accuracy.
Researcher Nikolai Tschacher disclosed his findings in a proof-of-concept (PoC) of the attack on January 2.
"The idea of the attack is very simple: You grab the MP3 file of the audio reCAPTCHA and you submit it to Google's own speech-to-text API
Top News
-
Google Maps Timeline Data to be Stored Locally on Your Device for Privacy
Google has announced plans to store Maps Timeline data locally on users' devices instead of their Google account effective December 1, 2024. The...
-
FPT Telecom International cung cấp dịch bảo mật Palo Alto Networks
Tại sự kiện An ninh mạng vượt trội cho doanh nghiệp ngày 5/6, Palo Alto Networks đã trao chứng nhận Đối tác cung cấp dịch vụ bảo mật - Managed...
-
Apple Refused to Pay $1 Million Bounty to Kaspersky Lab for iOS Zero-days
Apple has refused to pay Kaspersky Lab a reward for discovering critical vulnerabilities in iOS that allowed attackers to install spyware on any...
-
Cảnh báo: Lỗ hổng Oracle WebLogic Server đang bị khai thác
Cơ quan An ninh mạng và Cơ sở hạ tầng Hoa Kỳ (CISA) đã cảnh báo lỗ hổng trong Oracle WebLogic Server có mã CVE-2017-3506 với điểm CVSS 7,4....