Cybercrime, Dark web, Deep web

Dark web
“The dark web is the World Wide Web content that exists on darknets, overlay networks which use the public Internet but which require specific software, configurations or authorization to access.[2][3] The dark web forms a small part of the deep web, the part of the Web not indexed by search engines, although sometimes the term “deep web” is confusingly used to refer specifically to the dark web.”

Deep web
“The deep web,[1] invisible web,[2] or hidden web[3] are parts of the World Wide Web whose contents are not indexed by standard search engines for any reason. The deep web is opposite to the surface web.
The deep web includes many very common uses such as web mail, online banking but also paid for services with a paywall such as video on demand, and many more.
Computer scientist Mike Bergman is credited with coining the term deep web in 2000 as a search indexing term”

What is the Dark Web? How to access the Dark Web. What’s the difference between the Dark Web and the Deep Web?
“The UK government has launched a dedicated cybercrime unit to tackle the Dark Web. But what is that? We explain what is the Dark Web, how it differs from the Deep Web, and how to access the Dark Web. Plus: the Deep Web, the Deepnet, the Invisible Web, the Hidden Web and the Dark Internet. Everything you need to know about the hidden internet.”

“Cybercrime is a fast-growing area of crime. More and more criminals are exploiting the speed, convenience and anonymity of the Internet to commit a diverse range of criminal activities that know no borders, either physical or virtual, cause serious harm and pose very real threats to victims worldwide.”
Cyber crime
“Organised crime has been quick to take advantage of the opportunities offered by the Internet, particularly the growth in e-commerce and online banking.

Specialist criminal groups target individuals, small businesses and large corporate networks to steal personal information in bulk in order to profit from the compromised data available to them.
Phishing: bogus emails asking for security information and personal details
Webcam manager: where criminals takeover your webcam
File hijacker: where criminals hijack files and hold them to ransom
Keylogging: where criminals record what you type on your keyboard
Screenshot manager: allows criminals take screenshots of your computer screen
Ad clicker: allows a criminal to direct a victim’s computer to click a specific link
Visit our guidance page for consumers for further information on these threats, and tips on how to combat them.

Distributed Denial of Service (DDOS) attacks”
Cyber Crime
Cyber crime

How a Remote Town in Romania Has Become Cybercrime Central
Cyber crime: How companies are hit by email scams


What is the deep web and how do you access it?

Clearing Up Confusion – Deep Web vs. Dark Web