• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Dark Web Mentions • Security  /  What is the mystery about the Deep and Dark Web?
What is the mystery about the Deep and Dark Web?
19 June 2018

What is the mystery about the Deep and Dark Web?

Written by Sanjay Katkar
Sanjay Katkar
Dark Web Mentions, Security
6
Shares

Deep Web. Dark Web. Ransomware. Tor. Illegal activities. Bitcoin.

A cursory search of the first two terms would reveal a range of web pages, all talking about the next four terms. The mystery and suspense the deep and dark web have created is unprecedented – with pages and pages of horror stories, all talking about a shadowy part of the Internet (or perhaps, not even the Internet), hidden in plain sight.

So let’s uncover the mystery about this frightening “deep” and “dark” web.

For starters, the Internet is that part of the “normal” web which everyone uses. It has all the social media websites, the shopping websites, email websites. Basically, the Internet includes all content which has been indexed by search engines.

The “deep” web is that part of the Internet which has not been indexed by search engines. Hence, unlike many of the horror stories you’ve heard about it, the deep web is not by itself that horrifying. The deep web just has content like databases, lists, information, etc., which has not been indexed by search engines.

But wait. This is where we come to the “Dark Web”. And, by its very name, you can tell that this is trouble.

The dark web is a portion of the deep web which is intentionally hidden and is inaccessible through standard web browsers. Obviously, it is not indexed by search engines and it requires special software to access it. Specialized browsers like Tor are used to access it.

It is this “Dark Web” from where all the stories have originated. While there are some legitimate uses of the dark web (i.e. for storing sensitive criminal information), a large portion is used for criminal activities. Drugs are bought and sold here, illegal goods are transferred and even terrorism is conducted here. All transactions happen on the basis of Bitcoins, the anonymous cryptocurrency.

Cybersecurity experts have long worried about the activities going on in the dark web – but it is almost impossible to take any concrete action because of the sheer nature of the beast. The dark web thrives on anonymity and that is why it is a favorite for all manners of anti-social forces. From hackers to criminals to terrorists, they are all there.

Dark web and cybersecurity

But the dark web deeply affects cybersecurity. When data is breached, it almost always finds its way in the dark web, where it is up for sale. Security researchers recently found a 41GB file with 1.4 billion hacked and leaked passwords from various websites on the dark web. When the Indian global food startup Zomato was hacked, the data of 17 million Zomato users was up for sale on the platform. In October 2017, Seqrite discovered an advertisement on the dark web which claimed to have access to data from over 6,000 Indian business including government organizations, Internet Service Providers, banks and enterprises. The hacker had priced the information at 15 Bitcoins and was offering a network takedown of affected organizations for an unspecified amount.

Despite all its dangers, the dark web often provides valuable threat intelligence which could be instrumental in understanding the current cyber threats. Monitoring the dark web can often help boost security and identify breaches & vulnerabilities. Disclosed vulnerabilities can often appear on the dark web first before most organizations are aware of it and scrambling to fix it. This allows hackers valuable time to exploit these vulnerabilities – but if organizations monitor and react to the threat in time, they can be on the same page as the hackers and fix them as soon as possible.

Seqrite, the enterprise security solutions brand of Quick Heal Technologies, is a leading provider of security software solutions in India, has a DarkNet monitoring division called Seqrite Cyber Intelligence Labs which aims to create threat intelligence and monitor the Dark Web for vulnerabilities.

 Previous PostBlockchain: A brief introduction
Next Post  5 Poor security practices that endanger an IT organization
Sanjay Katkar

About Sanjay Katkar

Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies Limited. He holds a Masters in Computer Science from University of Pune, India. Sanjay has...

Articles by Sanjay Katkar »

Related Posts

  • data privacy

    The What, How, and Why of Data Privacy

    January 24, 2025
  • How the Recent Health Insurance Data Breach Could Affect You – and What You Can Do About It

    October 14, 2024
  • Defending against APT attacks with endpoint security

    How To Defend Against Advanced Persistent Threats (APTs): A Comprehensive Approach

    September 27, 2024
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (326) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies