Categories
Pages
-

IT Center Blog

Schlagwort: ‘phishing’

The Impact of Social Media on It Security

November 4th, 2024 | by
Einfluss von social media auf die IT-Sicherheit

Source: Freepik

Nowadays, almost everyone can be found on one or more social media platforms and runs one or more profiles, some of them for personal and others for professional purposes. Some use them to network, share photos of special events or stay in touch with their friends. Others use them to promote their company, association or organization. Although social networks offer numerous benefits and have become an integral part of our everyday lives, they also pose a number of risks, particularly in terms of IT security. In this post, we would like to highlight the various aspects of the impact of social media on IT security and provide an insight into how these challenges can be overcome.

 

 

Read the rest of this entry »

Halloween: The Nightmares of Cyber Security

October 31st, 2024 | by
Three carved halloween pumpkins

Source: Freepik

Fear. A feeling that probably all of us are familiar with. Especially around Halloween, the potential for scares increases. Be it the fear of disguised, made-up figures or even the worry that your sensitive data will fall into the hands of unauthorized persons. Perhaps it’s no coincidence that October of all months is IT Security Month? In this article, we take a look at a few “IT horror stories”, how you can protect yourself from them and share some interesting figures.

 

Read the rest of this entry »

QR Code Attacks

June 12th, 2023 | by
QR Code with mobile phone

Source: Own illustration

QR codes have become increasingly popular in recent years and are now used in almost all areas – whether in advertising, retail or public spaces. Especially since the Corona pandemic, QR codes have gained a lot of importance. For example, they made contact tracking in restaurants or contactless ordering in the catering industry possible. Many users appreciate QR codes because of their simplicity and the time they save, as they can be easily captured with a smartphone. At the same time, however, QR codes can also pose a threat to IT security. In this article, we’ll explain what you should always keep in mind when using QR codes.

 

Read the rest of this entry »

Beware of Meeting Invite Phishing Scam!

November 21st, 2022 | by
Laptop in front of orange background with incoming e-mail

Source: Own illustration

The way we work together has changed fundamentally in recent years. Among the major changes is the shift of work processes to the home office. Not only have everyday tasks had to be shifted into virtual space, but also the entire communication process. This is how online meetings and video conferencing became a central part of our working lives. The digitization of these work processes brings many benefits. However, it also confronts many companies and organizations with major challenges. One of these challenges is the drastic increase in cyber attacks. As is so often the case, Internet fraudsters have taken advantage of the new situation and quickly developed a variety of new types of fraud methods. These include, for example, phishing attempts via appointment invitations.

Read the rest of this entry »

Attention: Spear Phishing Emails in Circulation

September 30th, 2022 | by
Arrow through laptop

Source: Own illustration

In the last weeks, there have been more spear phishing attacks on RWTH email addresses. In this article, we would like to make you aware of these attacks and explain how you can recognize spear phishing emails. You have received a spear phishing email to your RWTH email address? We explain how you should best proceed. Read the rest of this entry »

Cyber-Security-Awareness-Training at RWTH – a Review

August 15th, 2022 | by
Padlock in front of world map

Source: Pixabay

No more simulated phishing emails in your inbox? No more access to the eLearning program for employees of the RWTH? That can only mean one thing: the cyber security awareness training at RWTH Aachen University ended for the time being on May 09, 2022.

Today we look back on the training and share the results with you. Read the rest of this entry »

Vishing: Stealing data on the phone

March 2nd, 2022 | by
Smartphone

Source: Pixabay

Cyber-attacks are not just part of everyday life in companies. Even when opening our private e-mail inboxes, we occasionally encounter peculiar e-mails suggesting that the addressee is required to take urgent action. The e-mail urges the addressee to update personal data, enter account information for the payout of a reward, or click on links. Phishing is no longer unknown among fraud methods. However, the attacks are becoming more and more elaborate. Somewhat less known and therefore more surprising, however, are so-called vishing attacks. Fraudsters are coming up with a lot of new ways to obtain data from their victims. Read the rest of this entry »

Cyber-Security-Awareness-Training at RWTH Aachen University

January 10th, 2022 | by
Mouse pointer on lettering Security

Source: Pixabay

Due to the increasing number of cyber attacks, which are also targeting universities and other institutions, RWTH Aachen University has been conducting an internal phishing simulation to increase cyber security awareness with the help of the security company SoSafe GmbH since December 06, 2021.

Read the rest of this entry »

Social Engineering – or: How we get tricked

November 6th, 2020 | by

Sometimes you just can’t say “no”. When the fundraising rescue workers are at the front door or in the pre-Christmas season the opportunities to do a good deed one more time this year are increasing. Of course we are happy to help, for we are social beings after all. However, this humanitarian side of us is being exploited increasingly. Social engineering aims to motivate people to do things they would not do under normal circumstances. This manipulation occurs everywhere – digitally, as well as in the real world.

Source: Pixabay

Read the rest of this entry »

Phishing – More Than Just a Sports Activity

November 4th, 2020 | by

In order to understand phishing and the context of the problem in more detail, it is worth making an excursion into social engineering. Social engineering refers to the consideration of social needs (of people).

Source: Pixabay

Read the rest of this entry »