Schlagwort: ‘IT-Security’
Important tips to better password security
Computers and internet access are now an integral part of our everyday lives. We use them not only for work, but also for private purposes. Whether it’s work-related documents, conversations with colleagues, friends and family, bank documents or the exchange of private photos; none of this should be visible to everyone.Whoever uses such technologies should also protect themselves. In order to protect yourself, an efficient password protection is essential.
![Login interface on a website](https://blog.rwth-aachen.de/itc/files/2020/11/registration-3938434_1920-1-1024x683.jpg)
Source: Pixabay
Phishing – More Than Just a Sports Activity
In order to understand phishing and the context of the problem in more detail, it is worth making an excursion into social engineering. Social engineering refers to the consideration of social needs (of people).
![](https://blog.rwth-aachen.de/itc/files/2020/11/phishing-3390518_1280-1024x666.jpg)
Source: Pixabay
(Deutsch) Go Live -Verschlüsselung mit Boxcryptor an der RWTH Aachen University
Statement on attacks on high-performance computing systems
Several high-performance data centres throughout Europe are currently victims of cyber attacks. Some centres have therefore blocked the access to their computing capacity at least in parts due to security incidents to protect against (further) attacks.
Against this background, we are also taking appropriate precautions and monitoring our systems even more closely than before. Our statement and recommendations on the IT Center website provide information on the current situation.
Phishing Attack on RWTH E-Mail Accounts: Data Theft –Not with us!
Hardly a day goes by without the media reporting on data theft by phishing, Trojans and so forth. The RWTH Aachen University has also been attacked recently. Already for several months, our mailboxes have been flooded with SPAM mails. For us as IT provider of the RWTH Aachen University this means that we do not want to let you fall into the phishing traps and other similar dangers.
In this blog post, you will find everything you need to know to protect your data and mailboxes from phishing, so that data theft does not happen in the first place.
Achtung – Angriffswelle!
Vielleicht habt Ihr es bereits mitbekommen, dass zurzeit merkwürdige E-Mails ihr Unwesen treiben. Über Hintergründe und aktuelle Angriffswellen klären wir Euch heute auf.
Der Virus
Bei der Virusgruppe Emotet handelt es sich um sogenannte Trojaner, die vor allem über Spam-E-Mails verbreitet werden. Die infizierte E-Mail enthält zumeist ein bösartiges Dokument mit aktivierten Makros, kann aber auch Anhänge oder Links enthalten, die zu solch einem Dokument weiterleiten.
![Die Infektionsstufen von Emotet.
Quelle: Internet Storm Center](https://blog.rwth-aachen.de/itc/files/2020/01/Emotet_1.jpg)
Die Infektionsstufen von Emotet.
Quelle: Internet Storm Center
Sicher surfen dank des richtigen Browsers
Wer im Internet unterwegs ist, kann bereits bei der Wahl seines Browsers einiges falsch machen. Obwohl die Hersteller von Browser stets versuchen ihre Programme so sicher wie möglich zu entwickeln, können sich immer Sicherheitslücken enthalten. Diese Sicherheitslücken im Browser können besonders problematisch sein, da Daten in der Regel auch aus nicht vertrauenswürdigen Quellen bei Nutzung eines Web-Browsers geladen werden können. Diese Daten können ebenfalls sogenannte Schadsoftware (wie zum Beispiel Viren, Trojaner usw.) enthalten. Es gibt jedoch Möglichkeiten diese Gefahren aus dem Weg zu gehen und die Auswahl eines sicheren Webbrowsers ist hierbei von großer Bedeutung.
![](https://blog.rwth-aachen.de/itc/files/2020/01/laptop-2557586_1920-1024x682.jpg)
Quelle: Pixabay
Keeping You Safe II – Our Security Note on Spear-Phishing Attacks
![](https://blog.rwth-aachen.de/itc/files/2019/12/phishing-3390518_1920-1024x666.jpg)
Targeted Phishing: Spear Phishing is a serious threat to our data.
Source: Pixabay
According to the Federal Office for the Protection of the Constitution (BfV), both universities and research institutions are in danger regarding them. What we are talking about here are spear phishing attacks. This is the technical term for very tricky cyber-attacks with targeted e-mails. This time, however, the wave of attacks is particularly vicious: the mails that are sent contain links to realistically simulated fake websites of the particular institutions and request users to enter their access data.