Online Authentication: When Fraudsters Take Advantage of Gaps