Despite the team's success, CAPTCHA remains a sound and useful security feature if implemented correctly, i.e. not exactly like everyone else does. By intelligently customizing any system you make it significantly harder to break. Researchers have cracked CAPTCHA, a program widely used to foil bots. One of the reason for the success is simiilar, flawed implementations of the CAPTCHA program. This shows how important it is to customize any off-the-shelf security system as much as possible. A team from Sanford University says their Decaptcha program was able to defeat 66 percent of captchas on Visa’s Authorize.net payment site; 70 percent at Blizzard Entertainment; 42 percent on Reddit and 35 percent on Slashdot. a quarter of the ones used by Wikipedia; along with those on a handful of other sites including CNN, eBay, Digg, and Captcha.net. In fact, the only Captchas that resisted Decaptcha were those belonging to Google. CAPTCHA (Completely Automated Public Turing Test to tell Computers and Humans Apart) uses a question-and-response system to determine if it is dealing with a person or a program. Users have to type a piece of text that is stretched, curved, jumbled, multicolored, slanted, crossed-out, or reversed. It frequently irritates users (this one in particular) who are allegedly human and still can’t decipher the text. Of course the researchers – Elie Bursztein, Matthieu Martin and John C. Mitchel – aren’t going to release their program but it is a safe bet that someone else will create their own version soon, if it hasn’t been done already. (There is also an audio version of Captcha. The team cracked that earlier this year.) Despite this CAPTCHA remains a sound and useful security feature if implemented correctly, i.e. not exactly like everyone else’s. By intelligently customizing the system you make it significantly harder to break. The researchers point out this is exactly why Google’s Recaptcha system “remains unbroken even-though it is in use for more than four years.” (See Seven Ways to Make CAPTCHA Safer) This same principle should be applied to any security system or application. Each variation you can come up means one more new challenge facing an intruder. You can’t wait until you know a system or application has been broken in order to implement changes. By the time you learn about it the hackers will likely have already come and gone. Evolution shows that species thrive when they can survive in many different environments. This means each species develops variations peculiar to its own needs. That also makes each variation less susceptible to any one particular virus or infection. Now, do you want to make it easier or harder for that virus to get you? Related content opinion Why Bitcoins are Just as Viable as Any Other Currency The true value of any currency is a reflection of how much people believe it's worth, according to CIO blogger Constantine von Hoffman. But it's wise to remember just how fast beliefs can change. By Constantine von Hoffman Apr 15, 2013 4 mins Government Technology Industry opinion No Surprise: Docs Show Obama Administration Lying About Drones President Obama has repeatedly said drones would only be used against members of al Qaida and allied groups. However, leaked intelligence documents show the administration has been using them to settle political and tribal feuds for at least four yea By Constantine von Hoffman Apr 10, 2013 3 mins Regulation Government opinion How Big Data Can Quickly Become Big Garbage The bigger the data the bigger the chance of mistakes or inaccuracies. In that vein, a large database used by retailers to screen people accused of stealing from employers is identifying innocent people and could result in major lawsuits, according t By Constantine von Hoffman Apr 04, 2013 2 mins Big Data opinion Why Crazy Trumps Logic on the Internet The earth is flat. Vaccines cause autism. 9/11 was a government conspiracy. These are just a few of the many ideas that continue to find adherents online despite overwhelming proof that they're not based on fact. CIO.com blogger Constantine von By Constantine von Hoffman Apr 02, 2013 3 mins Government Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe