You may have heard of the “dark web” quit a lot these days—It is a part of the online universe that requires specialized software to access it. Dark Web is complicated and uses encrypted technology that allows hackers to buy and sell illegal products and information and communicate confidentially while concealing their identities. Dark Web mainly is used by criminals for selling and buying drugs, guns, porn; and hackers for purchasing stolen sensitive information; and dissidents of oppressed countries where freedom of speech and press is curtailed.
Throughout the years, hackers have stolen the data and passwords of more than one billion Yahoo users and many other big corporations such as Amazon, Adobe and Netflix. Hackers have been selling that personal information on the “dark web” — dubbed “the hacker’s playground.” Experts estimate hundreds of millions of Internet passwords are compromised each year worldwide.
The stolen data is sold cheap. the average price of login credentials for video streaming services like Netflix are just a few pennies. Online bank login usernames and passwords are going for a few hundred dollars or less; but the amount of money a hacker or a criminal could then steal would make that a worthwhile investment. Also, the stolen data included credit and debit card numbers.
Although it is not impossible for an average user to access the dark web but it is hard to navigate and it is required to use an anonymizing browser called Tor. It masks your IP address and make it untraceable. Originally, Tor technology was developed by the US government to encrypt the US Navy data communication. But now Dark Web has its own ecosystem similar to internet.
If you ever wonder that your personal data is compromised in a breach there is a Free resource called “Have I been pwned?” – The site was developed by Troy Hunt (security expert and Microsoft Regional Director). It allows you to see by entering your email if your sensitive information is breached. The stats on the haveibeenpawned.com are mind boggling. For a list of frequently asked questions about the website, click here.
To check if your personal data may have been breached, click here, then enter your email address.
It is important to note that just because your email comes back with no evidence of being breached, your information could still be compromised. The breach just might not have been made public yet. There are other software and services that can be used to find out if your information is compromised.
The best way to protect yourself is by using secure passwords. Do not use the same password for multiple platforms. And, make your password complicated. Often, a phrase might be the best solution. For example, the password IT21ST_employees_Give100% includes capital and lowercase letters and special characters — while also being a phrase that is easy to remember. And no, that is not our actual password to anything.
AT IT21ST we offer free consultation, estimate and Network Security Analysis. Call us at 855-4IT-21ST or visit our Website WWW.IT21ST.com to set up an appointment with one of our IT expert.