IT Center Blog

Schlagwort: ‘phishing’

QR Code Attacks

June 12th, 2023 | by
QR Code with mobile phone

Source: Own illustration

QR codes have become increasingly popular in recent years and are now used in almost all areas – whether in advertising, retail or public spaces. Especially since the Corona pandemic, QR codes have gained a lot of importance. For example, they made contact tracking in restaurants or contactless ordering in the catering industry possible. Many users appreciate QR codes because of their simplicity and the time they save, as they can be easily captured with a smartphone. At the same time, however, QR codes can also pose a threat to IT security. In this article, we’ll explain what you should always keep in mind when using QR codes.


Read the rest of this entry »

Beware of Meeting Invite Phishing Scam!

November 21st, 2022 | by
Laptop in front of orange background with incoming e-mail

Source: Own illustration

The way we work together has changed fundamentally in recent years. Among the major changes is the shift of work processes to the home office. Not only have everyday tasks had to be shifted into virtual space, but also the entire communication process. This is how online meetings and video conferencing became a central part of our working lives. The digitization of these work processes brings many benefits. However, it also confronts many companies and organizations with major challenges. One of these challenges is the drastic increase in cyber attacks. As is so often the case, Internet fraudsters have taken advantage of the new situation and quickly developed a variety of new types of fraud methods. These include, for example, phishing attempts via appointment invitations.

Read the rest of this entry »

Attention: Spear Phishing Emails in Circulation

September 30th, 2022 | by
Arrow through laptop

Source: Own illustration

In the last weeks, there have been more spear phishing attacks on RWTH email addresses. In this article, we would like to make you aware of these attacks and explain how you can recognize spear phishing emails. You have received a spear phishing email to your RWTH email address? We explain how you should best proceed. Read the rest of this entry »

Cyber-Security-Awareness-Training at RWTH – a Review

August 15th, 2022 | by
Padlock in front of world map

Source: Pixabay

No more simulated phishing emails in your inbox? No more access to the eLearning program for employees of the RWTH? That can only mean one thing: the cyber security awareness training at RWTH Aachen University ended for the time being on May 09, 2022.

Today we look back on the training and share the results with you. Read the rest of this entry »

Vishing: Stealing data on the phone

March 2nd, 2022 | by

Source: Pixabay

Cyber-attacks are not just part of everyday life in companies. Even when opening our private e-mail inboxes, we occasionally encounter peculiar e-mails suggesting that the addressee is required to take urgent action. The e-mail urges the addressee to update personal data, enter account information for the payout of a reward, or click on links. Phishing is no longer unknown among fraud methods. However, the attacks are becoming more and more elaborate. Somewhat less known and therefore more surprising, however, are so-called vishing attacks. Fraudsters are coming up with a lot of new ways to obtain data from their victims. Read the rest of this entry »

Cyber-Security-Awareness-Training at RWTH Aachen University

January 10th, 2022 | by
Mouse pointer on lettering Security

Source: Pixabay

Due to the increasing number of cyber attacks, which are also targeting universities and other institutions, RWTH Aachen University has been conducting an internal phishing simulation to increase cyber security awareness with the help of the security company SoSafe GmbH since December 06, 2021.

Read the rest of this entry »

Social Engineering – or: How we get tricked

November 6th, 2020 | by

Sometimes you just can’t say “no”. When the fundraising rescue workers are at the front door or in the pre-Christmas season the opportunities to do a good deed one more time this year are increasing. Of course we are happy to help, for we are social beings after all. However, this humanitarian side of us is being exploited increasingly. Social engineering aims to motivate people to do things they would not do under normal circumstances. This manipulation occurs everywhere – digitally, as well as in the real world.

Source: Pixabay

Read the rest of this entry »

Phishing – More Than Just a Sports Activity

November 4th, 2020 | by

In order to understand phishing and the context of the problem in more detail, it is worth making an excursion into social engineering. Social engineering refers to the consideration of social needs (of people).

Source: Pixabay

Read the rest of this entry »

Phishing Attack on RWTH E-Mail Accounts: Data Theft –Not with us!

February 7th, 2020 | by

Hardly a day goes by without the media reporting on data theft by phishing, Trojans and so forth. The RWTH Aachen University has also been attacked recently. Already for several months, our mailboxes have been flooded with SPAM mails. For us as IT provider of the RWTH Aachen University this means that we do not want to let you fall into the phishing traps and other similar dangers.


In this blog post, you will find everything you need to know to protect your data and mailboxes from phishing, so that data theft does not happen in the first place.


Read the rest of this entry »

Keeping You Safe II – Our Security Note on Spear-Phishing Attacks

December 11th, 2019 | by


Targeted Phishing: Spear Phishing is a serious threat to our data.
Source: Pixabay


According to the Federal Office for the Protection of the Constitution (BfV), both universities and research institutions are in danger regarding them. What we are talking about here are spear phishing attacks. This is the technical term for very tricky cyber-attacks with targeted e-mails. This time, however, the wave of attacks is particularly vicious: the mails that are sent contain links to realistically simulated fake websites of the particular institutions and request users to enter their access data.


Read the rest of this entry »