Categories
Pages
-

IT Center Blog

Kategorie: ‘IT-Security’

Spam or Phishing? How to Spot the Difference

February 10th, 2026 | by
Symbolbild Phishing

Source: Own illustration

In keeping with today’s Safer Internet Day on February 10, 2026, this article is all about digital security. Spam and phishing emails show how important it is to remain vigilant in everyday life and to critically question suspicious emails. With a little caution and the right knowledge, you can better protect yourself — and the IT infrastructure of RWTH Aachen University.

Every day, we receive emails that are not always legitimate or welcome. Two types of unwanted communication are particularly common: spam and phishing. Both can be annoying, but phishing in poses a serious threat to your data.

In this article, you will learn how spam and phishing differ and how you can reliably identify suspicious emails.

 

 

Read the rest of this entry »

European Data Protection Day 2026

January 28th, 2026 | by
Silhouette of Europe, with white lettering reading: “January 28, 2026, European Data Protection Day”

Source: own illustration

In today’s digital age, data protection is more important than ever. That’s why every year on January 28, we celebrate European Data Protection Day – a date that reminds us of the importance of protecting our personal data and privacy in the digital world. At IT Center, we use this day as an opportunity to draw attention to key aspects of data protection.

Read the rest of this entry »

Workshop of the State Initiatives for Federated Identity Management

December 10th, 2025 | by
Network between representations of people.

Source: Pixabay

On November 12 and 13, 2025, the biannual workshop of the state initiatives for federated identity management (IDM) took place at the IT Center of RWTH Aachen University. This year’s meeting was organized by the staff of the IDM.nrw project, which supports universities in North Rhine-Westphalia on their way to a state-wide, federated identity management system.

Representatives from Baden-Württemberg, Bavaria, Berlin, Mecklenburg-Western Pomerania, Lower Saxony, North Rhine-Westphalia, Rhineland-Palatinate, Saxony-Anhalt, and Thuringia, as well as from the German National Research and Education Network (DFN), came to Aachen to exchange experiences, discuss challenges, and initiate joint developments.

 

Read the rest of this entry »

Recognizing Phishing – Deceptively Real, Yet Highly Dangerous

December 5th, 2025 | by
Symbolbild Phishing

Source: Own illustration

Why this topic matters

Phishing emails are among the most common types of cyberattacks- even at universities. Attackers attempt to obtain passwords, personal data, or access to systems by sending emails that appear deceptively legitimate.
These messages often look official: they contain logos, signatures, and sender addresses from well-known institutions such as RWTH Aachen Universitys. That is precisely what makes them so dangerous.

In this article, we will show you how such phishing messages are structured and what clues can help you recognize them early on. We will also present current examples from the RWTH so that you can better assess how genuine these emails often appear.

 

Read the rest of this entry »

IT-SAD: IT-Security Awareness Days 2025

November 3rd, 2025 | by

From November 3 to November 14, 2025, the IT Security Awareness Days will take place for the tenth time. During these two weeks, a total of 18 online lectures on the topic of IT security will be held. These are organized by various universities.

The following institutions are involved (although not always with their own presentations): TU Braunschweig, TU Darmstadt, TU Dresden, University of Hildesheim, KU Eichstätt-Ingolstadt, University of Göttingen/GWDG, University of Marburg, University of Osnabrück, Leuphana University Lüneburg, University of Duisburg-Essen, University of Cologne, and Albstadt-Sigmaringen University of Applied Sciences.

Read the rest of this entry »

DNS at RWTH Aachen Part 2: Security in the DNS – Protection Against Misuse

September 3rd, 2025 | by

Source: Own Illustration

In the first part of this blog series on the Domain Name System (DNS), we explained various technical details. The very fact that DNS servers are consulted to convert computer names into IP addresses means that the system plays a very central role in the functioning of the Internet.

Read the rest of this entry »

How quickly can my password be cracked?

August 13th, 2025 | by
Password being cracked with a crowbar

Source: Own Illustration

How long can your password currently withstand a hacker?

In times when cyberattacks are commonplace and current supercomputers can test billions of combinations per second (future quantum computers may be able to test many more), password security is becoming a matter of digital survival. In this article, you will find out what methods attackers use to crack passwords – and what simple measures can make the difference between data theft and digital security.

 

Read the rest of this entry »

SOC On-Call Service: IT Security Around the Clock

July 9th, 2025 | by
A protective shield with the text “SOC - Security Operation Center” on it; network structures in the background

Source: Own illustration

Whether it’s suspicious activity on the network, compromised user accounts, or acute cyber attacks – every minute counts in an emergency. In order to be able to respond to security incidents at RWTH even faster and more effectively in the future, the IT Center’s Security Operation Center (SOC) has had an on-call service since June 1, 2025. This means that the SOC team can now also be reached outside regular working hours if necessary, ensuring greater security in the university network around the clock.

 

Read the rest of this entry »

Towards the Future with AI – How the IT Center Is Supporting RWTH Aachen University on Its Way into the AI Age

July 4th, 2025 | by
a woman and a robot touching each other with their fingertips

Source: Pixabay

Artificial intelligence (AI) is no longer a topic for the future – it has arrived in the centre of society and is changing the way we research, learn and work. As one of Europe’s leading technical universities, it is therefore crucial for RWTH Aachen University to actively engage with the potential and challenges of this technology.

As RWTH’s central IT facility, the IT Center plays a central role in this: it develops technical solutions, ensures a data protection-compliant infrastructure and creates new services that enable the use of AI in the university context.

And not just since yesterday: For some time now, the IT Center has been working intensively on making artificial intelligence usable for the entire university.

Read the rest of this entry »

What Is Typosquatting?

June 18th, 2025 | by
Businessman hand touching to search icon bar

Source: Freepik

The internet offers many opportunities – but also risks. One of the lesser known but potentially very dangerous threats in the field of cyber security is typosquatting. But what does this term actually mean? Typosquatting refers to a technique in which attackers attempt to redirect users to fake or unwanted websites. This is usually done by exploiting typos or similar domain names of well-known websites. Instead of the actual website, you end up on a page that looks deceptively similar to the real one or contains completely different, sometimes malicious content.

Read the rest of this entry »