Schlagwort: ‘IT security’
Email Security – The SMTP Protocol and Its Problems (Sending and Receiving)

Source: Freepik
In our first article on the topic of e-mail security, we gave an insight into the historical development of email. We briefly explained how email exchange works and referred to the statistics of the email service at RWTH Aachen University.
Today we’ll tell you about the transmission protocol “Simple Mail Transfer Protocol” (SMTP) and its pitfalls.
CEO Fraud: When “Superiors” ask for Money

Source: Pixabay
Online fraud schemes are constantly evolving and becoming more devious. In some cases, it can be extremely difficult to spot the scam. Yet one particular fraud method seems to be growing in popularity in recent years and, more importantly, causing ever greater damage: the CEO Fraud. In this article, we’ll explain exactly how this method works and how you can protect yourself from it. Read the rest of this entry »
Email Security – E-Mail & Mail Statistics at RWTH

Source: Freepik
About 50 years ago, the first e-mail was sent – albeit between two computer systems that were part of the same local network. In the 1980s, the internet was opened up to a larger circle of users and e-mail was given its own transmission protocol “Simple Mail Transfer Protocol” (SMTP).
Even today, the exchange of messages via e-mail is undoubtedly an important way of exchanging information between parties via an asynchronous communication channel.
Results of the ZKI Top Trends Survey-2022

Source: Pexels
Once again this year, the Strategy and Organisation Working Group of the Association of Centres for Communication and Information Processing conducted a survey on the most important topics and trends of IT institutions from research institutions and universities in Germany. 85 institutions participated in this year’s survey, providing exciting insights into promising IT topics that will shape the year 2022.
Are you wondering what the top trends and topics are and what you need to be prepared for in the IT world? Then you’ve come to the right place!
Backdoors: Access Through an Alternative Access Point

Source: Pixabay
In life, sometimes it can be very useful to have a plan B or to keep a backdoor open. But would you leave your house and hide the keys to the backdoor under the doormat? For burglars, this setup would probably be an easy target. In IT as well, so-called backdoors are a very popular target for hackers. However, these backdoors are much more tricky and discreet than an open door or hidden keys under a doormat. Because even when the original breach of security, such as an open window, no longer exists, cybercriminals can still get in and out as they please via the implemented backdoor.
Macros – Our Measures For Your Security

Photo: Freepik
***Change of editorial department on 02.11.2021***
E-mails are often misused for phishing attempts and to spread malware. Especially emails with file attachments should be checked critically. In our first article on macros, we explained what macros are and why they can be dangerous. In today’s article, you will learn what precautions are now being taken, what alternative options are available for sending documents, and what precautions you can take to protect yourself from files with dangerous macros. Read the rest of this entry »
How can I recognize trustworthy websites?

Source: Pixabay
Surfing the Internet is part of our everyday lives. Both in our private lives and at work, we are using the World Wide Web. We visit websites to inform ourselves, to communicate and even to shop. In the process, data from your own device will automatically be transferred to the website you are visiting and vice versa. When surfing, you should therefore critically inspect every website you visit. Just like in the real world, there are safe places on the Internet and places that you should avoid for your own safety. Nevertheless, how can you judge a website correctly and how can you distinguish between a trustworthy and an untrustworthy website? The following criteria should help you! Read the rest of this entry »
IT-SAD: IT Security Awareness Days 2021!

Online and without any registration – the IT Security Awareness Days 2021
Source: TU Braunschweig
Trustworthy IT infrastructure is essential these days, especially when it comes to IT security. But did you know that most cyber attacks take advantage of human vulnerabilities? Terms like social engineering and (spear-)fishing are becoming more and more popular. In other words, IT security is not limited to the implementation of a solid IT infrastructure. In fact, the human factor can be the greatest vulnerability. Accordingly, it is particularly crucial to involve every single user and to educate them about the various threats.


