Monday, October 25

Dark Web: It is very easy to reach, and the danger is as great

The deep corridors of the Internet, which are not at all safe and constitute the infrastructure for many crimes, also known as the Dark Web, are extremely inconvenient for users in case of unconscious use. Answering our questions about the Dark Web, Experian Partner Solutions Technological Innovation Manager Adam Tyler told Hürriyet what they were curious about.

Can you briefly explain what is the Dark Web?

The world has changed dramatically in the last 20 years. In this sense, technology was seen as an area of ​​interest for people who are called ‘geeks’ and a small number of people. We live in a world where even people with very little use of a computer or digital device now depend on online services. The asset or gain owned by a person has now become an easy target to be stolen. Our data has always been valuable to us, and in today’s digital world, our identity information, money, family, and secrets are now the key to every detail.

When talking about Data Theft, the people who committed this action are generally described as ‘genius’ or ‘criminal’, but the facts are actually quite different from this. In the world we live in, everyone can easily access this information through a few keywords and search engines.

Anyone who knows the right words or phrases can easily enter this area called the ‘Dark Web’ and find tools that will allow them to perform some actions that they usually don’t understand. Every day, the Experian CyberAgent solution detects hundreds, if not millions, of personal information and email addresses stolen from credit cards. Even online bank account details are regularly detected through our “DarkWeb” monitoring and tracking service. Many people feel that Data Theft will never affect them. They also feel that they are not wealthy enough to be a target. The truth is that; Everyone is a potential target, whether the attacks target them directly or a company with personal data.

dark web dangers

Throughout the panel I held at the Experian Innovation Summit’18, I discussed why we are confronted with fraudulent transactions today, who are the perpetrators of the next generation of fraudulent transactions, how they have access to the information and tools to carry out these attacks, how a person can affect everyone and the reasons why it has become worse and worse. I explained. Along with detailed information about the reality of the Dark Web, I also mentioned how easy it is to access here. Finally, and most importantly, I explained what awaits us in the future.

Fraud is a scary subject, but it is made even more frightening by people because they don’t know or understand who might be involved in how and how. A professional who will educate you about current risks and gain insight into your current and future situation can minimize this fear. It will also provide the tools and information needed to keep both consumers and companies safe.

Fraud in the internet environment and hiding identity by hiding the profile has been in our lives for a long time. What dark side of the internet we are fighting against, what do you offer to protect us from?

In an environment where the internet is constantly evolving and changing, fraudulent transactions are also changing. At the same time, fraud is at a very different point now compared to 10 years ago. The purpose and focus are always the same; seizing data and cash from wherever possible. The biggest difference we see is the increased accessibility to both information and data. Everything that was previously hidden can now be found easily thanks to search engines. There are no barriers to preventing access to the Dark Web, which means the flow of information is completely open. Anyone who has spare time and a computer can easily join the growing ‘hacker’ communities.

bitcoinle kiralik katil tutan kadin
Woman Holding a Murderer with Bitcoin on Dark Web Arrested!

How does users’ personal information reach the Dark Web? How are users affected by this situation?

hacker 2300772 1920 696x464 1

Stolen data can come from many places. Often times, a user whose data is stolen is not even aware that it has been stolen. Defining a particular way of stealing data is essentially tantamount to asking how to cook a dish. There are millions of different ways each method has its own pros and cons. We can summarize some of the methods used to capture data as follows:

Attacks on third-party websites: Users share important data with third-party websites and sometimes these websites do not take the necessary measures to protect their users’ data.

Malware: This software is one of the biggest plagues of the 21st century. Trojans, Keyloggers and other malware are designed to break into users’ devices and steal information through various mechanisms.

Data Theft through Phishing: Some users are unaware that they caused an accident by sending their information out by mistake while responding to e-mails.

Social engineering: Social engineering has become the main method and tool of 21st century hackers. In many attacks, the users who own these devices, not the devices or computer networks used, cause the attacks to be successful.

Digitalization is now an integral part of our lives and is gradually integrating into business manners. What are your suggestions to users in terms of fraudulent transactions or protection from malicious people?

Fraudulent transactions will always exist. The security industry develops many different protection methods to keep customers’ data safe, from AntiVirus software to EMV software designed to protect credit cards. Security is essentially like a game of cat and mouse, and no protection can last more than a few years as long as there are malicious people.

The only way to be safe in this new and interconnected digital world requires up-to-date follow-up and training. Training and insight are the only way users and companies can stay completely safe. Having a reliable service provider not only allows you to know the dangers you face today, it also helps you stay aware of the threats that are coming and stay safe.

Companies should also be aware that attacks are not necessarily due to their own mistakes. Continuous monitoring of information leaked by third-party suppliers or organizations that have access to the data ensures that companies are aware of whether their external accounts are compromised.

5af5315db5a7930ebcd98e8a