Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/10/2019
03:00 PM
Kelly Sheridan
Kelly Sheridan
Slideshows
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail

Demystifying the Dark Web: What You Need to Know

The Dark Web and Deep Web are not the same, neither is fully criminal, and more await in this guide to the Internet's mysterious corners.
2 of 8

What Is the Deep Web?
The Internet can be broken into three general parts, Wilson says. The clear, or surface, Web is the part of the Internet we use every day to check the weather, read the news, and get the latest sports scores. We don't need special technology or credentials to gain access.
Then there is the Deep Web - the part of the Internet not discoverable by standard search engines. It's hard to determine the exact size of the Deep Web because of the sheer number of websites it includes: pages that require logins, for example, and internal company networks. Bank accounts, social media accounts, email accounts, and forums are all part of the Deep Web.
The Deep Web is often conflated with the Dark Web, the third part, because people consider it 'a hidden part' of the Internet, Wilson says. But this is not entirely true - most people use the Deep Web every day. 'You can't find it on Google or other search engines,' she says. 'It's not indexed, but that doesn't mean it's hidden in a nefarious way,' she says. The Deep Web contains a massive number of websites not available on the surface Web, but being hidden does not make them criminal.
Cybercrime does happen on the Deep Web, she adds. Criminals buy and sell credit cards on websites that require login credentials but not access to the Dark Web. 'They're also not trying too hard,' Wilson notes. For greater anonymity, they go to the Dark Web, the part of the Internet most often associated with crime.  
(Image: Serg269 - stock.adobe.com)

What Is the Deep Web?

The Internet can be broken into three general parts, Wilson says. The clear, or surface, Web is the part of the Internet we use every day to check the weather, read the news, and get the latest sports scores. We don't need special technology or credentials to gain access.

Then there is the Deep Web the part of the Internet not discoverable by standard search engines. It's hard to determine the exact size of the Deep Web because of the sheer number of websites it includes: pages that require logins, for example, and internal company networks. Bank accounts, social media accounts, email accounts, and forums are all part of the Deep Web.

The Deep Web is often conflated with the Dark Web, the third part, because people consider it "a hidden part" of the Internet, Wilson says. But this is not entirely true most people use the Deep Web every day. "You can't find it on Google or other search engines," she says. "It's not indexed, but that doesn't mean it's hidden in a nefarious way," she says. The Deep Web contains a massive number of websites not available on the surface Web, but being hidden does not make them criminal.

Cybercrime does happen on the Deep Web, she adds. Criminals buy and sell credit cards on websites that require login credentials but not access to the Dark Web. "They're also not trying too hard," Wilson notes. For greater anonymity, they go to the Dark Web, the part of the Internet most often associated with crime.

(Image: Serg269 stock.adobe.com)

2 of 8
Comment  | 
Print  | 
Comments
Threaded  |  Newest First  |  Oldest First
matty37
50%
50%
matty37,
User Rank: Apprentice
10/29/2019 | 9:08:32 AM
the dark web
But isn't it right? I do think that most people don't have their fears out of nowhere, and this perception about the dark web was created based on something. It might be not as bad as it's portrayed, but it's definitely not a safe place as well. I would like to try it out and see how it looks like, but I'm currently still debating if it's worth it. I heard that you have to use Tor to access it, although I also have SurfsharkVPN; hopefully, that will increase my safety if I decide to take a glimpse
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8813
PUBLISHED: 2020-02-22
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
CVE-2020-9039
PUBLISHED: 2020-02-22
Couchbase Server 4.x and 5.x before 6.0.0 has Insecure Permissions for the projector and indexer REST endpoints (they allow unauthenticated access).
CVE-2020-8860
PUBLISHED: 2020-02-22
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Samsung Galaxy S10 Firmware G973FXXS3ASJA, O(8.x), P(9.0), Q(10.0) devices with Exynos chipsets. User interaction is required to exploit this vulnerability in that the target must answer a phone call. T...
CVE-2020-8861
PUBLISHED: 2020-02-22
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1330 1.10B01 BETA Wi-Fi range extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue ...
CVE-2020-8862
PUBLISHED: 2020-02-22
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-2610 Firmware v2.01RC067 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. The issue results from the ...