Categories
Pages
-

IT Center Blog

Schlagwort: ‘IT security’

IT-SAD: IT-Security Awareness Days 2025

November 3rd, 2025 | by

From November 3 to November 14, 2025, the IT Security Awareness Days will take place for the tenth time. During these two weeks, a total of 18 online lectures on the topic of IT security will be held. These are organized by various universities.

The following institutions are involved (although not always with their own presentations): TU Braunschweig, TU Darmstadt, TU Dresden, University of Hildesheim, KU Eichstätt-Ingolstadt, University of Göttingen/GWDG, University of Marburg, University of Osnabrück, Leuphana University Lüneburg, University of Duisburg-Essen, University of Cologne, and Albstadt-Sigmaringen University of Applied Sciences.

Read the rest of this entry »

How quickly can my password be cracked?

August 13th, 2025 | by
Password being cracked with a crowbar

Source: Own Illustration

How long can your password currently withstand a hacker?

In times when cyberattacks are commonplace and current supercomputers can test billions of combinations per second (future quantum computers may be able to test many more), password security is becoming a matter of digital survival. In this article, you will find out what methods attackers use to crack passwords – and what simple measures can make the difference between data theft and digital security.

 

Read the rest of this entry »

How to Set up a Secure Home Network

May 14th, 2025 | by
Illustration of a laptop displaying a login screen, surrounded by icons for internet, Wi-Fi, data sharing, media, and a security shield with a padlock.

Source: Freepik

More and more devices in our everyday lives are connected to the internet – from home offices and online banking to smart thermostats and surveillance cameras. And all these digital helpers access a common system: the home network. It forms the heart of our digital infrastructure at home. In this article, we explain what a home network is, what risks it poses, and how you can effectively protect it from attacks.

 

Read the rest of this entry »

DNS at RWTH Aachen University Part 1:
History & Function of the DNS

May 5th, 2025 | by
A globe with location markers connected by lines, next to it a laptop with a security lock symbol on the screen, in the background a cityscape with a WLAN symbol and flying paper airplanes.

Source: Freepik

The Domain Name System (DNS) makes the Internet usable by translating readable names such as rwth-aachen.de into IP addresses. It originated from simple lists of names and developed into a globally distributed, hierarchical system. Today, it fulfils many more tasks – for example in the areas of e-mail, IT security and network management. The DNS also plays a central role at RWTH Aachen University and is protected by modern technologies such as DNS firewalls. This article provides an overview of the origin, structure and current significance of the DNS.

 

Read the rest of this entry »

Face ID on the Rise – But What Is Behind the Technology?

April 7th, 2025 | by

Source: Freepik

Face ID has been around for a relatively short time. Facial recognition secures our data and makes it accessible only to us. We have explored this technology and gathered all the essential information to provide insight into its complex mechanics and potential security risks.

Read the rest of this entry »

European Data Privacy Day 2025

January 29th, 2025 | by
Lock and security icons with laptop in the middle

Source: Freepik

Every year on January 28 is European Data Privacy Day – a date that reminds us of the importance of protecting our personal data and privacy in the digital world. We at the IT Center take this day as an opportunity to draw attention to key aspects of data protection.  We already emphasised the importance of protecting our personal data in last year’s article.

Read the rest of this entry »

Updates Again! – Why Are Regular Software Updates So Important?

November 29th, 2024 | by
Locks

Source: Stockvault

An update is the updating of the version of a software, information or version. In the case of software updates, for example, a distinction is made between security and firmware updates, and in the case of information updates, for example, between situation, news and status updates. Version updates usually refer to technical devices.

 

Read the rest of this entry »

Beware of Tech Support Scams: How You Can Protect Yourself

November 25th, 2024 | by
“Are You Sure?” Warning Message

Source: Freepik

In today’s digital world, we are constantly connected to technology – whether it’s through our smartphones, computers or other electronic devices. Unfortunately, there are people who take advantage of this fact to scam the unsuspecting. One common scam that many fall victim to is the tech support scam. In this blog post, we want to explain how the scam works and how you can protect to protect yourself.

 

Read the rest of this entry »

The Impact of Social Media on It Security

November 4th, 2024 | by
Einfluss von social media auf die IT-Sicherheit

Source: Freepik

Nowadays, almost everyone can be found on one or more social media platforms and runs one or more profiles, some of them for personal and others for professional purposes. Some use them to network, share photos of special events or stay in touch with their friends. Others use them to promote their company, association or organization. Although social networks offer numerous benefits and have become an integral part of our everyday lives, they also pose a number of risks, particularly in terms of IT security. In this post, we would like to highlight the various aspects of the impact of social media on IT security and provide an insight into how these challenges can be overcome.

 

 

Read the rest of this entry »

Halloween: The Nightmares of Cyber Security

October 31st, 2024 | by
Three carved halloween pumpkins

Source: Freepik

Fear. A feeling that probably all of us are familiar with. Especially around Halloween, the potential for scares increases. Be it the fear of disguised, made-up figures or even the worry that your sensitive data will fall into the hands of unauthorized persons. Perhaps it’s no coincidence that October of all months is IT Security Month? In this article, we take a look at a few “IT horror stories”, how you can protect yourself from them and share some interesting figures.

 

Read the rest of this entry »