The dark web works like the internet we all know and use every day. It utilizes the same framework and networks the regular internet uses–but the dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
Within the dark web lies a criminal marketplace that facilitates the sale of stolen credentials and identities. And more often than not, when they succeed it’s because credentials have been compromised.
Overview of the Web
- Public Web - 4% of the Internet - information that you would normally find on search engines. If you're like most people, this is where you spend most of your time - doing things like online shopping, searching for info, social media. However, this represents only about 4% of the internet.
- Deep Web - 93% of the Internet - information that is not indexed by search engines and does not require authentication. These sites won't show up in any search results. Just because information is here, it doesn't mean it's something bad or illegal, though. The deep web includes:
- Internal company sites
- School intranets
- Online databases
- Member-only websites or pages behind paywalls
These sites may live in this space because they're something that the owners don't want accessible to the public. Many deep web sites are legal, just purposely hidden. Sometimes you may hear the deep web referred to as a "bad" place to go, but that's usually because many people confuse the deep web with the dark web.
Dark Web - 3% of the Internet- information that is not accessible by normal internet browsers. The dark web isn't an actual place, but rather a hidden network of websites. While it requires special resources, it's just a matter of steps and getting certain systems set up that provide a way in for those looking to join the dark web and keep information such as their IP address hidden.
Visitors here utilize anonymity software to mask visitors' true identities. When you visit a website on the world wide web, IP addresses trace online activity on your computer. But on the dark web, with the masking software activated, a computer takes a randomized path to its file destination, bouncing around a number of encrypted connections to ultimately mask both location and identity.
Why Is the Dark Web So Popular with Criminals?
Because of its hidden nature and the using special applications to maintain anonymity, it's not surprising that the dark web can be a haven for all kinds of illicit activity (including the trafficking of stolen personal information captured through means such as data breaches or hacks). This means if you've ever been a victim of a data breach, it's a place where your sensitive information might live.
Savvy cyber-thieves may wait some time before using the data they buy, because immediately following a breach, many people are more guarded and on the lookout for red flags on accounts, bills and their credit report.
BE ALERTED IF YOUR INFORMATION IS ON THE DARK WEB
Lincoln Computer Services protects you and your organization from the dark side of the web. Our service monitors compromised credentials on the dark web and alerts you of a potential breach of your corporate email addresses and passwords.
The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
Dark Web Monitoring
• Monitor compromised credentials
• Safeguard the personal credentials of targeted executives
• Detection of compromised credentials
• Protect against a breach with early detection
• Automatically identify and filter results
• Response to compromise, ahead of a breach
• Alerts and notifications of credentials on the dark web
Protect Your Organization
Our Security Experts are here and ready to answer any questions you may have about the dark web or any other cybersecurity issues you may have. We are offering a Complimentary Dark Web Scan for a limited time!