• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Security  /  What is the mystery about the Deep and Dark Web?
deep web
19 June 2018

What is the mystery about the Deep and Dark Web?

Written by Sanjay Katkar
Sanjay Katkar
Security
  • 6
    Shares
Estimated reading time: 3 minutes

Deep Web. Dark Web. Ransomware. Tor. Illegal activities. Bitcoin.

A cursory search of the first two terms would reveal a range of web pages, all talking about the next four terms. The mystery and suspense the deep and dark web have created is unprecedented – with pages and pages of horror stories, all talking about a shadowy part of the Internet (or perhaps, not even the Internet), hidden in plain sight.

So let’s uncover the mystery about this frightening “deep” and “dark” web.

For starters, the Internet is that part of the “normal” web which everyone uses. It has all the social media websites, the shopping websites, email websites. Basically, the Internet includes all content which has been indexed by search engines.

The “deep” web is that part of the Internet which has not been indexed by search engines. Hence, unlike many of the horror stories you’ve heard about it, the deep web is not by itself that horrifying. The deep web just has content like databases, lists, information, etc., which has not been indexed by search engines.

But wait. This is where we come to the “Dark Web”. And, by its very name, you can tell that this is trouble.

The dark web is a portion of the deep web which is intentionally hidden and is inaccessible through standard web browsers. Obviously, it is not indexed by search engines and it requires special software to access it. Specialized browsers like Tor are used to access it.

It is this “Dark Web” from where all the stories have originated. While there are some legitimate uses of the dark web (i.e. for storing sensitive criminal information), a large portion is used for criminal activities. Drugs are bought and sold here, illegal goods are transferred and even terrorism is conducted here. All transactions happen on the basis of Bitcoins, the anonymous cryptocurrency.

Cybersecurity experts have long worried about the activities going on in the dark web – but it is almost impossible to take any concrete action because of the sheer nature of the beast. The dark web thrives on anonymity and that is why it is a favorite for all manners of anti-social forces. From hackers to criminals to terrorists, they are all there.

Dark web and cybersecurity

But the dark web deeply affects cybersecurity. When data is breached, it almost always finds its way in the dark web, where it is up for sale. Security researchers recently found a 41GB file with 1.4 billion hacked and leaked passwords from various websites on the dark web. When the Indian global food startup Zomato was hacked, the data of 17 million Zomato users was up for sale on the platform. In October 2017, Seqrite discovered an advertisement on the dark web which claimed to have access to data from over 6,000 Indian business including government organizations, Internet Service Providers, banks and enterprises. The hacker had priced the information at 15 Bitcoins and was offering a network takedown of affected organizations for an unspecified amount.

Despite all its dangers, the dark web often provides valuable threat intelligence which could be instrumental in understanding the current cyber threats. Monitoring the dark web can often help boost security and identify breaches & vulnerabilities. Disclosed vulnerabilities can often appear on the dark web first before most organizations are aware of it and scrambling to fix it. This allows hackers valuable time to exploit these vulnerabilities – but if organizations monitor and react to the threat in time, they can be on the same page as the hackers and fix them as soon as possible.

Seqrite, the enterprise security solutions brand of Quick Heal Technologies, is a leading provider of security software solutions in India, has a DarkNet monitoring division called Seqrite Cyber Intelligence Labs which aims to create threat intelligence and monitor the Dark Web for vulnerabilities.

 Previous PostBlockchain: A brief introduction
Next Post  5 Poor security practices that endanger an IT organization
Sanjay Katkar
About Sanjay Katkar

Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of Quick Heal Technologies Limited. He holds a Masters in Computer Science from University...

Articles by Sanjay Katkar »

Related Posts

  • GandCrab Riding Emotet’s Bus!

    February 15, 2019
  • GandCrab Ransomware along with Monero Miner and Spammer

    January 24, 2019
  • GandCrab says, “We will become back very soon! ;)”

    December 18, 2018

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
  • This is how hackers can invade your system without installing malware This is how hackers can invade your system without installing malware February 1, 2019

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Ankita Ashesh
    Ankita Ashesh

    Ankita is a Communications Strategist at Quick Heal with a passion for covering...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • GandCrab Riding Emotet’s Bus!

    GandCrab Riding Emotet’s Bus!

    February 15, 2019
  • Increase in threats to mobile devices

    Increase in threats to mobile devices

    February 14, 2019
  • Biometric authentication data at risk

    Biometric authentication data at risk

    February 12, 2019
Tweets by @Seqrite

Join our Newsletter

Sign up for our Newsletter and get regular cybersecurity round-ups delivered to your inbox.

Follow Us On

Topics

Antivirus For Linux (9) Antivirus For Server (9) Bitcoin (6) Cryptocurrency (7) Cyber-attack (29) cyber-attacks (54) Cybersecurity (165) cyber security (24) Cyber threat (28) cyber threats (44) data breach (48) data breaches (27) data loss (28) data loss prevention (33) data protection (20) data security (13) DLP (49) Encryption (11) endpoint security (94) Enterprise security (12) Exploit (12) firewall (8) GDPR (7) hackers (7) incident response plan (9) malware (24) malware attack (20) malware attacks (12) MDM (18) mobile device management (9) Network security (16) Patch Management (12) phishing (15) Ransomware (43) ransomware attack (29) ransomware attacks (29) ransomware protection (12) Seqrite (15) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) Unified Threat Management (7) UTM (30) Vulnerability (9) WannaCry (7)

Products

  • End Point Security (EPS)
  • Seqrite Encryption
  • Seqrite Endpoint Security Cloud
  • Mobile Device Management (MDM)
  • Cloud Security
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2018 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.