Dark Web and the threat of armed robbery that Colombia faces in cybersecurity

The depths of the internet hide endless crimes.  One of the best known is theft as a crime.  According to the survey, 17% of Colombians claim to be affected by identity theft.

The depths of the internet hide endless crimes. One of the best known is theft as a crime. According to the survey, 17% of Colombians claim to be affected by identity theft.

In the infinite world of the Internet, there are little-known places that go beyond what we see in our daily browsing experience. “Deep Web” and “Dark Web” are two terms that are often used as a connection, but they actually represent different parts of the Internet and are less accessible to the average user.

In the current digitization area, the Dark Web presents a dark side and some dangers. Its secret nature, based on anonymous and illegal advice, hides a crime of cybercriminals, financial fraud, illegal business, and threats to personal privacy.

In Colombia, according to data from a survey by Norton, 17% of people have been victims of digital identity theft. A type of crime that may involve using stolen personal information to commit fraud such as opening bank accounts, applying for loans, or committing other financial fraud against the victim torture.

Research, carried out from March 6 to 22, 2024, among 1,008 adults, also determined that the attack increases the risk of theft and damage of various types:

  • 43% lost valuable time in efforts to solve problems caused by attacks.
  • 38% lost access to their various online accounts.
  • 27% had to cancel their credit card.
  • 23% affected their credit score
  • 20% were stolen.

Attempted theft has many variations, and the participants in the survey indicate that the most common in the country are: impersonation, fraud through social networks, Financial fraud, influence on social network or email and phishing.

Of the percentage of interviewees who said they suffered a cyber attack, 19% said it happened in the past 12 months. An image that sets off a cybersecurity alarm in Colombia.

Various technologies: Boston Dynamics reinvents its humanoid robots and unveils new electronics

In an interview with El Espectador, Iskander Sánchez-Rola, Director of Privacy Innovation for Norton, and Fernanda Palomino, Social Media and Public Relations Manager of Gen Latin America, discussed the various layers of the internet, how to identify individuals and recommendations. in which personal information is exposed in cyberspace.

Internet Iceberg

To understand the depth of navigation and the internet, Sánchez-Rola uses the image of an iceberg. At the point, out of the water, will be the “Tree Web”, that is, “everything we access in the Internet browsing every day, such as Google, Bing, Wikipedia or news sites.” This set is free and available to everyone.

Going into the big ice, we find the deep web, which includes private funds, organizations or organizations that the public cannot access. For example, medical records, government publications, platform registration, etc. “All of this would be considered the deep web, because you can’t see it unless you have a username and password,” Sánchez-Rola added.

Finally, in the deepest part of the ice, there is the dark web, which works with a full internet connection. Norton’s director of innovation explained “Access to it, usually at least three hops on different servers in different countries,” He added that the privacy policy This allows a high level of restrictions that attract cybercriminals to commit crimes such as drug trafficking, cryptocurrency fraud or any other crime.

Information on the Dark Web

It is common for people to be unaware of the information that companies have about their users. From clothing stores, forums, work platforms, etc. Any database can be vulnerable to hacker attacks, depending on the security level of the platforms. Information obtained by computer experts published on the dark web with free access also contains other private details, which can be obtained by payment with bitcoins or money.

“The Dark Web presents a secret business where anonymity reigns, making it a breeding ground for crimes ranging from cybercrime to the sale of sensitive information. Unfortunately, the Personal information accessed improperly can lead to identity theft,” said Sánchez-Rola.

You may also be interested in: This is the model that sells more than 250 million mobile phones worldwide

Regarding the visibility and content of the posts on the dark web, Sánchez-Rola said that in the eyes of the general public it seems to be tedious and boring because of the alphanumeric notifications . However, he explained that they use these posts to avoid detection and prevent unwanted access. Similarly, pages on the dark web only last a few days, and are constantly updated to increase privacy.

How to identify the threat of theft?

According to Fernanda Palomino, to identify a personal threat it is important to take into account the following signs:

  • Unusual phone functions: If you see pages that the person has not accessed, applications that are not installed appear or start to work more slowly.
  • Trouble accessing money: there are problems in accessing email or social media accounts, such as credentials that the user has not specified.
  • Unpaid bank charges: Charges for purchases that were not made with different cards can be signs of identity theft.
  • Complaints about confirmation or notification: a signature will be authenticated when the user has not attempted to log in.

In addition to the signs, the Norton team has mentioned what the user can do to be careful. The first thing is to be careful with information that is public in social networks, because sometimes, it is necessary information for them to access private information.

Second, it is important that people do not rush to click on emails, ads or web pages without carefully reading what they are going to. It can be a gateway to a malicious website where your information can be stolen.

What if the digital number is compromised?

If you see some of the above signs and are sure that you are a victim of an attack, Palomino recommends that you:

  • Change passwords of their own money as soon as possible to protect information and business transactions, in the banking information. Likewise, it is recommended to have a different password for each account and a two-step authentication process.
  • Contact the bank or financial institutionand if it is possible to freeze the bank account, because if the third party controls the identity theft, they will have access to them.
  • Make a request connected, even because of the information sent by the relationship or the financial institution, the main thing is to warn about the result.

👽👽👽 Are you aware of the latest news? machine? We invite you to visit our section in El Espectador.

Check Also

Internet and cable installer killed in Colonia San Rafael 2, area 18 – Publinenews

The Guatemalan was on his way to install cable, television and internet service when he …

Leave a Reply

Your email address will not be published. Required fields are marked *