{"id":4241,"date":"2025-01-10T15:39:16","date_gmt":"2025-01-10T14:39:16","guid":{"rendered":"https:\/\/blog.rwth-aachen.de\/elektrotechnik\/?p=4241"},"modified":"2025-01-10T15:39:16","modified_gmt":"2025-01-10T14:39:16","slug":"hacker-attacken-und-schaedlinge-eine-aktuelle-uebersicht","status":"publish","type":"post","link":"https:\/\/blog.rwth-aachen.de\/elektrotechnik\/en\/hacker-attacken-und-schaedlinge-eine-aktuelle-uebersicht\/","title":{"rendered":"Hackers, attacks and malware &#8211; an up-to-date overview"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_4241 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_4241')){$('.twoclick_social_bookmarks_post_4241').socialSharePrivacy({\"services\":{\"facebook\":{\"status\":\"on\",\"txt_info\":\"2 Klicks f\\u00fcr mehr Datenschutz: Erst wenn Sie hier klicken, wird der Button aktiv und Sie k\\u00f6nnen Ihre Empfehlung an Facebook senden. Schon beim Aktivieren werden Daten an Dritte \\u00fcbertragen - siehe <em>i<\\\/em>.\",\"perma_option\":\"off\",\"action\":\"recommend\",\"language\":\"en_US\"}},\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blog.rwth-aachen.de\\\/elektrotechnik\\\/en\\\/hacker-attacken-und-schaedlinge-eine-aktuelle-uebersicht\\\/\",\"post_id\":4241,\"post_title_referrer_track\":\"Hackers%2C+attacks+and+malware+%26%238211%3B+an+up-to-date+overview\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p><div id=\"attachment_4243\" style=\"width: 2010px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4243\" class=\"wp-image-4243 size-full\" src=\"https:\/\/blog.rwth-aachen.de\/elektrotechnik\/files\/2025\/01\/show_picture-ulrike-meyer_big.jpg\" alt=\"Portrait of a smiling woman\" width=\"2000\" height=\"1212\" srcset=\"https:\/\/blog.rwth-aachen.de\/elektrotechnik\/files\/2025\/01\/show_picture-ulrike-meyer_big.jpg 2000w, https:\/\/blog.rwth-aachen.de\/elektrotechnik\/files\/2025\/01\/show_picture-ulrike-meyer_big-300x182.jpg 300w, https:\/\/blog.rwth-aachen.de\/elektrotechnik\/files\/2025\/01\/show_picture-ulrike-meyer_big-1024x621.jpg 1024w, https:\/\/blog.rwth-aachen.de\/elektrotechnik\/files\/2025\/01\/show_picture-ulrike-meyer_big-768x465.jpg 768w, https:\/\/blog.rwth-aachen.de\/elektrotechnik\/files\/2025\/01\/show_picture-ulrike-meyer_big-1536x931.jpg 1536w\" sizes=\"auto, (max-width: 2000px) 100vw, 2000px\" \/><p id=\"caption-attachment-4243\" class=\"wp-caption-text\">Professor Ulrike Meyer, \u00a9Peter Winandy<\/p><\/div><\/p>\n<p><span style=\"color: #00549f;\"><strong>Professor Ulrike Meyer from the Department of IT Security at RWTH Aachen will give an online lecture on Wednesday, January 29, 2025, from 5:00 PM to 6:30 PM, followed by a discussion. Admission is free.<\/strong><\/span><\/p>\n<p>The threats posed by cyberattacks have steadily increased, and IT security has thus increasingly come into focus for companies as well as individuals. During the presentation of the current report on the state of IT security in Germany (2024) by the Federal Office for Information Security, its president Claudia Plattner describes the IT threat situation as &#8220;worrisome&#8221; and states that &#8220;particularly ransomware, espionage, and disinformation endanger our prosperity and our democracy&#8221;.<\/p>\n<p>The lecture addresses current attacks and the underlying business models of cybercriminals. Additionally, a selection of solution approaches developed at RWTH for attack detection using machine learning will be presented.<\/p>\n<p>In cooperation with the Computer Science Department of RWTH, FZ J\u00fclich, Regional Group of the Society for Computer Science (RIA), Regional Industrial Club for Computer Science Aachen (Regina), and Aachen Group of the German University Association.<\/p>\n<hr \/>\n<p>Access to the webinar and video via <a href=\"https:\/\/se-rwth.github.io\/ria\">access link<\/a><\/p>\n<p>If someone misses the lecture, they can watch it later as a video.<\/p>","protected":false},"excerpt":{"rendered":"<p>Professor Ulrike Meyer from the Department of IT Security at RWTH Aachen will give an online lecture on Wednesday, January 29, 2025, from 5:00 PM to 6:30 PM, followed by [&hellip;]<\/p>\n","protected":false},"author":6351,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"c2c_always_allow_admin_comments":false,"footnotes":""},"categories":[1,3],"tags":[327,328,326],"class_list":["post-4241","post","type-post","status-publish","format-standard","hentry","category-allgemein","category-veranstaltungen","tag-cyber-security","tag-hackerangriff","tag-it-sicherheit"],"_links":{"self":[{"href":"https:\/\/blog.rwth-aachen.de\/elektrotechnik\/en\/wp-json\/wp\/v2\/posts\/4241","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.rwth-aachen.de\/elektrotechnik\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.rwth-aachen.de\/elektrotechnik\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/elektrotechnik\/en\/wp-json\/wp\/v2\/users\/6351"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/elektrotechnik\/en\/wp-json\/wp\/v2\/comments?post=4241"}],"version-history":[{"count":18,"href":"https:\/\/blog.rwth-aachen.de\/elektrotechnik\/en\/wp-json\/wp\/v2\/posts\/4241\/revisions"}],"predecessor-version":[{"id":4262,"href":"https:\/\/blog.rwth-aachen.de\/elektrotechnik\/en\/wp-json\/wp\/v2\/posts\/4241\/revisions\/4262"}],"wp:attachment":[{"href":"https:\/\/blog.rwth-aachen.de\/elektrotechnik\/en\/wp-json\/wp\/v2\/media?parent=4241"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/elektrotechnik\/en\/wp-json\/wp\/v2\/categories?post=4241"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/elektrotechnik\/en\/wp-json\/wp\/v2\/tags?post=4241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}