Categories
Pages
-

IT Center Blog

Kategorie: ‘IT-Security’

Workshop of the State Initiatives for Federated Identity Management

December 10th, 2025 | by
Network between representations of people.

Source: Pixabay

On November 12 and 13, 2025, the biannual workshop of the state initiatives for federated identity management (IDM) took place at the IT Center of RWTH Aachen University. This year’s meeting was organized by the staff of the IDM.nrw project, which supports universities in North Rhine-Westphalia on their way to a state-wide, federated identity management system.

Representatives from Baden-Württemberg, Bavaria, Berlin, Mecklenburg-Western Pomerania, Lower Saxony, North Rhine-Westphalia, Rhineland-Palatinate, Saxony-Anhalt, and Thuringia, as well as from the German National Research and Education Network (DFN), came to Aachen to exchange experiences, discuss challenges, and initiate joint developments.

 

Read the rest of this entry »

Recognizing Phishing – Deceptively Real, Yet Highly Dangerous

December 5th, 2025 | by
Symbolbild Phishing

Source: Own illustration

Why this topic matters

Phishing emails are among the most common types of cyberattacks- even at universities. Attackers attempt to obtain passwords, personal data, or access to systems by sending emails that appear deceptively legitimate.
These messages often look official: they contain logos, signatures, and sender addresses from well-known institutions such as RWTH Aachen Universitys. That is precisely what makes them so dangerous.

In this article, we will show you how such phishing messages are structured and what clues can help you recognize them early on. We will also present current examples from the RWTH so that you can better assess how genuine these emails often appear.

 

Read the rest of this entry »

IT-SAD: IT-Security Awareness Days 2025

November 3rd, 2025 | by

From November 3 to November 14, 2025, the IT Security Awareness Days will take place for the tenth time. During these two weeks, a total of 18 online lectures on the topic of IT security will be held. These are organized by various universities.

The following institutions are involved (although not always with their own presentations): TU Braunschweig, TU Darmstadt, TU Dresden, University of Hildesheim, KU Eichstätt-Ingolstadt, University of Göttingen/GWDG, University of Marburg, University of Osnabrück, Leuphana University Lüneburg, University of Duisburg-Essen, University of Cologne, and Albstadt-Sigmaringen University of Applied Sciences.

Read the rest of this entry »

DNS at RWTH Aachen Part 2: Security in the DNS – Protection Against Misuse

September 3rd, 2025 | by

Source: Own Illustration

In the first part of this blog series on the Domain Name System (DNS), we explained various technical details. The very fact that DNS servers are consulted to convert computer names into IP addresses means that the system plays a very central role in the functioning of the Internet.

Read the rest of this entry »

How quickly can my password be cracked?

August 13th, 2025 | by
Password being cracked with a crowbar

Source: Own Illustration

How long can your password currently withstand a hacker?

In times when cyberattacks are commonplace and current supercomputers can test billions of combinations per second (future quantum computers may be able to test many more), password security is becoming a matter of digital survival. In this article, you will find out what methods attackers use to crack passwords – and what simple measures can make the difference between data theft and digital security.

 

Read the rest of this entry »

SOC On-Call Service: IT Security Around the Clock

July 9th, 2025 | by
A protective shield with the text “SOC - Security Operation Center” on it; network structures in the background

Source: Own illustration

Whether it’s suspicious activity on the network, compromised user accounts, or acute cyber attacks – every minute counts in an emergency. In order to be able to respond to security incidents at RWTH even faster and more effectively in the future, the IT Center’s Security Operation Center (SOC) has had an on-call service since June 1, 2025. This means that the SOC team can now also be reached outside regular working hours if necessary, ensuring greater security in the university network around the clock.

 

Read the rest of this entry »

Towards the Future with AI – How the IT Center Is Supporting RWTH Aachen University on Its Way into the AI Age

July 4th, 2025 | by
a woman and a robot touching each other with their fingertips

Source: Pixabay

Artificial intelligence (AI) is no longer a topic for the future – it has arrived in the centre of society and is changing the way we research, learn and work. As one of Europe’s leading technical universities, it is therefore crucial for RWTH Aachen University to actively engage with the potential and challenges of this technology.

As RWTH’s central IT facility, the IT Center plays a central role in this: it develops technical solutions, ensures a data protection-compliant infrastructure and creates new services that enable the use of AI in the university context.

And not just since yesterday: For some time now, the IT Center has been working intensively on making artificial intelligence usable for the entire university.

Read the rest of this entry »

What Is Typosquatting?

June 18th, 2025 | by
Businessman hand touching to search icon bar

Source: Freepik

The internet offers many opportunities – but also risks. One of the lesser known but potentially very dangerous threats in the field of cyber security is typosquatting. But what does this term actually mean? Typosquatting refers to a technique in which attackers attempt to redirect users to fake or unwanted websites. This is usually done by exploiting typos or similar domain names of well-known websites. Instead of the actual website, you end up on a page that looks deceptively similar to the real one or contains completely different, sometimes malicious content.

Read the rest of this entry »

How to Set up a Secure Home Network

May 14th, 2025 | by
Illustration of a laptop displaying a login screen, surrounded by icons for internet, Wi-Fi, data sharing, media, and a security shield with a padlock.

Source: Freepik

More and more devices in our everyday lives are connected to the internet – from home offices and online banking to smart thermostats and surveillance cameras. And all these digital helpers access a common system: the home network. It forms the heart of our digital infrastructure at home. In this article, we explain what a home network is, what risks it poses, and how you can effectively protect it from attacks.

 

Read the rest of this entry »

DNS at RWTH Aachen University Part 1:
History & Function of the DNS

May 5th, 2025 | by
A globe with location markers connected by lines, next to it a laptop with a security lock symbol on the screen, in the background a cityscape with a WLAN symbol and flying paper airplanes.

Source: Freepik

The Domain Name System (DNS) makes the Internet usable by translating readable names such as rwth-aachen.de into IP addresses. It originated from simple lists of names and developed into a globally distributed, hierarchical system. Today, it fulfils many more tasks – for example in the areas of e-mail, IT security and network management. The DNS also plays a central role at RWTH Aachen University and is protected by modern technologies such as DNS firewalls. This article provides an overview of the origin, structure and current significance of the DNS.

 

Read the rest of this entry »