Categories
Pages
-

IT Center Blog

Schlagwort: ‘IT-Security’

Insider Threat: The Threat from Within

May 16th, 2022 | by
Person in front of monitor

Source: Pixabay

In an increasingly digitalized world, cyber threats are playing an ever greater role. The pandemic and working at home also favor these threats. In the last two years, the number of cyber attacks has increased sharply. This is also confirmed by a study by EY (german only). The human factor plays a major role in this context. But what if the threat itself comes from within the company’s own ranks? So-called insider threats are often underestimated by many companies and organizations. Yet the effects of such a threat can be devastating. Read the rest of this entry »

IT-SAD: IT-Security Awareness Days 2022

April 22nd, 2022 | by

From the 2nd to the 19th of May 2022, the IT Security Awareness Days will take place for the third time. During these three weeks, a total of 17 online lectures will be held on the topic of IT security (only conducted in the German language). The lectures will be organised by various universities.

So far, the TU Braunschweig, TU Dresden, KU Eichstätt-Ingolstadt, Uni Göttingen/GWDG, Uni Osnabrück, Uni Duisburg-Essen and the Uni Köln are actively involved. Read the rest of this entry »

Macros – E-mail Filtering at RWTH

March 25th, 2022 | by
Screen with 2 ladybugs, gear and envelope

Source: Pixabay

E-mails are a major gateway for cyberattacks. These attacks are no longer isolated incidents and are part of our everyday life. Especially the spreading of malware through attached documents with macros are very popular among cyber criminals. These macros can for example contain hidden malware. If the recipient activates these macros when opening the document, any malicious software they may contain can cause great damage. For this reason, a protection mechanism for e-mail macro filtering was installed for the RWTH e-mail service on November 16, 2021. Office documents are the most used, but also PDFs, e.g. containing form fields. Read the rest of this entry »

SQL Injection: Databases Attacks

March 23rd, 2022 | by
Medical syringe

Source: Pixabay

Database systems are essential in many aspects. They allow large amounts of data to be organized, read and stored for the long term. The field of application of database systems is vast and so is the amount of personal data stored in them. For example, banks and insurance companies use databases to structure and store account information and information relating to accounting transactions. Every time we search for a product in a web store, we access a specific database, and our user data, such as login information, is also stored in databases. At best, these sensitive data are encrypted. The effort required to build and maintain these electronic databases is great – but the biggest challenge is to ensure their security. One of the greatest threats to these databases and the data they contain are so-called code injections. Read the rest of this entry »

Results of the ZKI Top Trends Survey-2022

March 4th, 2022 | by
Woman in IT landscape

Source: Pexels

Once again this year, the Strategy and Organisation Working Group of the Association of Centres for Communication and Information Processing conducted a survey on the most important topics and trends of IT institutions from research institutions and universities in Germany. 85 institutions participated in this year’s survey, providing exciting insights into promising IT topics that will shape the year 2022.

Are you wondering what the top trends and topics are and what you need to be prepared for in the IT world? Then you’ve come to the right place!

Read the rest of this entry »

Vishing: Stealing data on the phone

March 2nd, 2022 | by
Smartphone

Source: Pixabay

Cyber-attacks are not just part of everyday life in companies. Even when opening our private e-mail inboxes, we occasionally encounter peculiar e-mails suggesting that the addressee is required to take urgent action. The e-mail urges the addressee to update personal data, enter account information for the payout of a reward, or click on links. Phishing is no longer unknown among fraud methods. However, the attacks are becoming more and more elaborate. Somewhat less known and therefore more surprising, however, are so-called vishing attacks. Fraudsters are coming up with a lot of new ways to obtain data from their victims. Read the rest of this entry »

IT-Security and the Internet of Things

February 11th, 2022 | by
Graphical representation of IoT

Source: Pixabay

The number of smart technologies seeing the light of day is growing steadily. Any everyday problem either gets its own smart solution or becomes at least supported by new technologies. The Internet is all around and supports us in every single aspect of our lives. By now, even our coffee machines are connected to our smartphone and ensures that our coffee is already waiting for us in the kitchen while we are still sitting at our desk. The so-called Internet of Things has countless advantages and is rightly referred to as the 4th Industrial Revolution. What exactly lies behind this term, what are the risks, and how can we avoid them? Read the rest of this entry »

Safer Internet Day 2022 – Together for a better Internet

February 7th, 2022 | by
Logo vom Safer Internet Day

We support the Safer Internet Day. Do you? (Source: Saferinternet.org)

How safe is our use of the Internet? That is not an easy question to answer. Some risks we are aware of, but others are often completely underestimated. Whether one’s own use of the Internet is really safe is usually only noticed, if at all, when it is already too late. Therefore, it is particularly important to raise awareness of the risks and emerging concerns about using the Internet. From cyberbullying to social media use or digital identity, every year the international Safer Internet Day (SID) aims to raise awareness about Internet safety. Read the rest of this entry »

Backdoors: Access Through an Alternative Access Point

January 17th, 2022 | by
A door that is open a crack.

Unnoticed access through the backdoor can be particularly tricky. (Source: Pixabay.com)

In life, sometimes it can be very useful to have a plan B or to keep a backdoor open. But would you leave your house and hide the keys to the backdoor under the doormat? For burglars, this setup would probably be an easy target. In IT as well, so-called backdoors are a very popular target for hackers. However, these backdoors are much more tricky and discreet than an open door or hidden keys under a doormat. Because even when the original breach of security, such as an open window, no longer exists, cybercriminals can still get in and out as they please via the implemented backdoor.

Read the rest of this entry »

DFN-PKI certificates – where does the identity check take place?

January 12th, 2022 | by
Entrance IT-ServiceDesk

Source: Own Illustration

You have applied for a DFN-PKI certificate, want to hand in the application and need to come to the IT Center for the identity check, but don’t know where exactly? No problem, we will show you the way!

Read the rest of this entry »