• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Security  /  What is the mystery about the Deep and Dark Web?
deep web
19 June 2018

What is the mystery about the Deep and Dark Web?

Written by Sanjay Katkar
Sanjay Katkar
Security
  • 6
    Shares
Estimated reading time: 3 minutes

Deep Web. Dark Web. Ransomware. Tor. Illegal activities. Bitcoin.

A cursory search of the first two terms would reveal a range of web pages, all talking about the next four terms. The mystery and suspense the deep and dark web have created is unprecedented – with pages and pages of horror stories, all talking about a shadowy part of the Internet (or perhaps, not even the Internet), hidden in plain sight.

So let’s uncover the mystery about this frightening “deep” and “dark” web.

For starters, the Internet is that part of the “normal” web which everyone uses. It has all the social media websites, the shopping websites, email websites. Basically, the Internet includes all content which has been indexed by search engines.

The “deep” web is that part of the Internet which has not been indexed by search engines. Hence, unlike many of the horror stories you’ve heard about it, the deep web is not by itself that horrifying. The deep web just has content like databases, lists, information, etc., which has not been indexed by search engines.

But wait. This is where we come to the “Dark Web”. And, by its very name, you can tell that this is trouble.

The dark web is a portion of the deep web which is intentionally hidden and is inaccessible through standard web browsers. Obviously, it is not indexed by search engines and it requires special software to access it. Specialized browsers like Tor are used to access it.

It is this “Dark Web” from where all the stories have originated. While there are some legitimate uses of the dark web (i.e. for storing sensitive criminal information), a large portion is used for criminal activities. Drugs are bought and sold here, illegal goods are transferred and even terrorism is conducted here. All transactions happen on the basis of Bitcoins, the anonymous cryptocurrency.

Cybersecurity experts have long worried about the activities going on in the dark web – but it is almost impossible to take any concrete action because of the sheer nature of the beast. The dark web thrives on anonymity and that is why it is a favorite for all manners of anti-social forces. From hackers to criminals to terrorists, they are all there.

Dark web and cybersecurity

But the dark web deeply affects cybersecurity. When data is breached, it almost always finds its way in the dark web, where it is up for sale. Security researchers recently found a 41GB file with 1.4 billion hacked and leaked passwords from various websites on the dark web. When the Indian global food startup Zomato was hacked, the data of 17 million Zomato users was up for sale on the platform. In October 2017, Seqrite discovered an advertisement on the dark web which claimed to have access to data from over 6,000 Indian business including government organizations, Internet Service Providers, banks and enterprises. The hacker had priced the information at 15 Bitcoins and was offering a network takedown of affected organizations for an unspecified amount.

Despite all its dangers, the dark web often provides valuable threat intelligence which could be instrumental in understanding the current cyber threats. Monitoring the dark web can often help boost security and identify breaches & vulnerabilities. Disclosed vulnerabilities can often appear on the dark web first before most organizations are aware of it and scrambling to fix it. This allows hackers valuable time to exploit these vulnerabilities – but if organizations monitor and react to the threat in time, they can be on the same page as the hackers and fix them as soon as possible.

Seqrite, the enterprise security solutions brand of Quick Heal Technologies, is a leading provider of security software solutions in India, has a DarkNet monitoring division called Seqrite Cyber Intelligence Labs which aims to create threat intelligence and monitor the Dark Web for vulnerabilities.

 Previous PostBlockchain: A brief introduction
Next Post  5 Poor security practices that endanger an IT organization
Sanjay Katkar
About Sanjay Katkar

Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of Quick Heal Technologies Limited. He holds a Masters in Computer Science from University...

Articles by Sanjay Katkar »

Related Posts

  • Is your Router exposed to cyber threats

    Is your router exposed to cyber threats? Here is how to safeguard it.

    July 30, 2020
  • Snake ransomware stings to spread its venom in the veins of enterprise networks.

    Snake Ransomware brings impending doom to enterprise networks

    July 10, 2020
  • APT harbingers are using Honey Traps to attack Indian Defence.

    Operation ‘Honey Trap’: APT36 Targets Defence Organizations in India

    July 8, 2020

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • The Data breach inferno burning big-ticket businesses The Data breach inferno burning big-ticket businesses February 5, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks Pharma Sector needs to streamline its insides to avoid cyberattacks February 12, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond Turn the Page: Cybersecurity Predictions for 2021 & beyond February 18, 2021

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Businesses now worried about the surge in COVID-19 infodemic

    Businesses now worried about the surge in COVID-19 infodemic

    February 26, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (279) cyber security (25) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.