Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/10/2019
03:00 PM
Kelly Sheridan
Kelly Sheridan
Slideshows
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail

Demystifying the Dark Web: What You Need to Know

The Dark Web and Deep Web are not the same, neither is fully criminal, and more await in this guide to the Internet's mysterious corners.
2 of 8

What Is the Deep Web?

The Internet can be broken into three general parts, Wilson says. The clear, or surface, Web is the part of the Internet we use every day to check the weather, read the news, and get the latest sports scores. We don't need special technology or credentials to gain access.

Then there is the Deep Web the part of the Internet not discoverable by standard search engines. It's hard to determine the exact size of the Deep Web because of the sheer number of websites it includes: pages that require logins, for example, and internal company networks. Bank accounts, social media accounts, email accounts, and forums are all part of the Deep Web.

The Deep Web is often conflated with the Dark Web, the third part, because people consider it "a hidden part" of the Internet, Wilson says. But this is not entirely true most people use the Deep Web every day. "You can't find it on Google or other search engines," she says. "It's not indexed, but that doesn't mean it's hidden in a nefarious way," she says. The Deep Web contains a massive number of websites not available on the surface Web, but being hidden does not make them criminal.

Cybercrime does happen on the Deep Web, she adds. Criminals buy and sell credit cards on websites that require login credentials but not access to the Dark Web. "They're also not trying too hard," Wilson notes. For greater anonymity, they go to the Dark Web, the part of the Internet most often associated with crime.

(Image: Serg269 stock.adobe.com)

2 of 8
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
matty37
50%
50%
matty37,
User Rank: Apprentice
10/29/2019 | 9:08:32 AM
the dark web
But isn't it right? I do think that most people don't have their fears out of nowhere, and this perception about the dark web was created based on something. It might be not as bad as it's portrayed, but it's definitely not a safe place as well. I would like to try it out and see how it looks like, but I'm currently still debating if it's worth it. I heard that you have to use Tor to access it, although I also have SurfsharkVPN; hopefully, that will increase my safety if I decide to take a glimpse
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Nicole Ferraro, Contributing Writer,  8/3/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15820
PUBLISHED: 2020-08-08
In JetBrains YouTrack before 2020.2.6881, the markdown parser could disclose hidden file existence.
CVE-2020-15821
PUBLISHED: 2020-08-08
In JetBrains YouTrack before 2020.2.6881, a user without permission is able to create an article draft.
CVE-2020-15823
PUBLISHED: 2020-08-08
JetBrains YouTrack before 2020.2.8873 is vulnerable to SSRF in the Workflow component.
CVE-2020-15824
PUBLISHED: 2020-08-08
In JetBrains Kotlin before 1.4.0, there is a script-cache privilege escalation vulnerability due to kotlin-main-kts cached scripts in the system temp directory, which is shared by all users by default.
CVE-2020-15825
PUBLISHED: 2020-08-08
In JetBrains TeamCity before 2020.1, users with the Modify Group permission can elevate other users' privileges.