Categories
Pages
-

IT Center Blog

Schlagwort: ‘IT-Security’

Important tips to better password security

November 13th, 2020 | by

Computers and internet access are now an integral part of our everyday lives. We use them not only for work, but also for private purposes. Whether it’s work-related documents, conversations with colleagues, friends and family, bank documents or the exchange of private photos; none of this should be visible to everyone.Whoever uses such technologies should also protect themselves. In order to protect yourself, an efficient password protection is essential.

Login interface on a website

Source: Pixabay

Read the rest of this entry »

Social Engineering – or: How we get tricked

November 6th, 2020 | by

Sometimes you just can’t say “no”. When the fundraising rescue workers are at the front door or in the pre-Christmas season the opportunities to do a good deed one more time this year are increasing. Of course we are happy to help, for we are social beings after all. However, this humanitarian side of us is being exploited increasingly. Social engineering aims to motivate people to do things they would not do under normal circumstances. This manipulation occurs everywhere – digitally, as well as in the real world.

Source: Pixabay

Read the rest of this entry »

Phishing – More Than Just a Sports Activity

November 4th, 2020 | by

In order to understand phishing and the context of the problem in more detail, it is worth making an excursion into social engineering. Social engineering refers to the consideration of social needs (of people).

Source: Pixabay

Read the rest of this entry »

(Deutsch) Erneute Bedrohung durch Emotet

October 14th, 2020 | by

Sorry, this entry is only available in Deutsch.

(Deutsch) Go Live -Verschlüsselung mit Boxcryptor an der RWTH Aachen University

September 25th, 2020 | by

Sorry, this entry is only available in Deutsch.

Statement on attacks on high-performance computing systems

May 15th, 2020 | by

Several high-performance data centres throughout Europe are currently victims of cyber attacks. Some centres have therefore blocked the access to their computing capacity  at least in parts due to security incidents to protect against (further) attacks.

Server room high performance computer
Source: Own illustration

Against this background, we are also taking appropriate precautions and monitoring our systems even more closely than before. Our statement and recommendations on the IT Center website provide information on the current situation.

Read the rest of this entry »

Phishing Attack on RWTH E-Mail Accounts: Data Theft –Not with us!

February 7th, 2020 | by

Hardly a day goes by without the media reporting on data theft by phishing, Trojans and so forth. The RWTH Aachen University has also been attacked recently. Already for several months, our mailboxes have been flooded with SPAM mails. For us as IT provider of the RWTH Aachen University this means that we do not want to let you fall into the phishing traps and other similar dangers.

 

In this blog post, you will find everything you need to know to protect your data and mailboxes from phishing, so that data theft does not happen in the first place.

 

Read the rest of this entry »

Achtung – Angriffswelle!

January 24th, 2020 | by

Vielleicht habt Ihr es bereits mitbekommen, dass zurzeit merkwürdige E-Mails ihr Unwesen treiben. Über Hintergründe und aktuelle Angriffswellen klären wir Euch heute auf.

 

Der Virus

 

Bei der Virusgruppe Emotet handelt es sich um sogenannte Trojaner, die vor allem über Spam-E-Mails verbreitet werden. Die infizierte E-Mail enthält zumeist ein bösartiges Dokument mit aktivierten Makros, kann aber auch Anhänge oder Links enthalten, die zu solch einem Dokument weiterleiten.

 

Die Infektionsstufen von Emotet. 
Quelle: Internet Storm Center

Die Infektionsstufen von Emotet.
Quelle: Internet Storm Center

Read the rest of this entry »

Sicher surfen dank des richtigen Browsers

January 22nd, 2020 | by

Wer im Internet unterwegs ist, kann bereits bei der Wahl seines Browsers einiges falsch machen. Obwohl die Hersteller von Browser stets versuchen ihre Programme so sicher wie möglich zu entwickeln, können sich immer Sicherheitslücken enthalten. Diese Sicherheitslücken im Browser können besonders problematisch sein, da Daten in der Regel auch aus nicht vertrauenswürdigen Quellen bei Nutzung eines Web-Browsers geladen werden können. Diese Daten können ebenfalls sogenannte Schadsoftware (wie zum Beispiel Viren, Trojaner usw.) enthalten. Es gibt jedoch Möglichkeiten diese Gefahren aus dem Weg zu gehen und die Auswahl eines sicheren Webbrowsers ist hierbei von großer Bedeutung.

Quelle: Pixabay

Read the rest of this entry »

Keeping You Safe II – Our Security Note on Spear-Phishing Attacks

December 11th, 2019 | by

 

Targeted Phishing: Spear Phishing is a serious threat to our data.
Source: Pixabay

 

According to the Federal Office for the Protection of the Constitution (BfV), both universities and research institutions are in danger regarding them. What we are talking about here are spear phishing attacks. This is the technical term for very tricky cyber-attacks with targeted e-mails. This time, however, the wave of attacks is particularly vicious: the mails that are sent contain links to realistically simulated fake websites of the particular institutions and request users to enter their access data.

 

Read the rest of this entry »