Jump to navigation
Digital networking now permeates almost all areas of life. Developing protective mechanisms is an urgent task.
With an innovative approach, Bochum scientists and international colleagues are creating new standards for data security in the cache of electronic devices.
Many people with statutory health insurance don’t understand the digital infrastructure behind electronic health records. One issue in particular raises concerns.
Researchers have tested the software of three satellites. And they found many standard security mechanisms missing.
Intelligent monkeys, mathematical lattice fences and holes in a computer housing: find out what they have to do with IT security in our Rubin special edition.
Who has ever been hit by cybercrime? How do people protect themselves from it? A survey reveals similarities and differences between different groups around the world.
Humans often have no chance whatsoever of distinguishing artificially created images, audio or videos from the real deal. This is why researchers are working on automated recognition
The problem affects signatures in Word documents, for example.
Uta Menges and Jonas Hielscher want to lift the label of being a nuisance from IT security measures and incorporate them more effectively into everyday life.
Cryptocurrencies are not subject to centralised governance. The community holds the power – but fails to do all that needs to be done. As a result, the collateral of the currency might be at risk.
5G has plenty more to offer than 4G. Radix Security makes sure that it doesn’t leave any security gaps open.
Funded by the European Research Council with 2.5 million euros, Gregor Leander is developing new encryption methods. He wanders off the beaten track and doesn’t simply rely on the principle of trial and error.
Many encryption algorithms are mathematically proven to be one hundred per cent secure. Nevertheless, they sometimes fail to protect confidential data. This is because encryption doesn’t happen merely in theory.
Attackers have the ability not only to manipulate software, but also to tamper with the hardware. A team from Bochum is devising methods to detect such tampering.
Attacks on the TLS protocol are both rare and highly complex. And yet, the encryption experts at Ruhr University Bochum are constantly tracking down new ones.
Drones shouldn’t be able to fly over airports and should have a unique serial number. In theory.
Algorithms made in Bochum are becoming the global standard for secure encryption in the age of quantum computing. They’ve arrived just in time.
Secret services want to know as much as possible. For example, they try to circumvent data encryption. This can cause collateral damage, warn Bochum researchers.
Pascal Sasdrich will be funded by the Deutsche Forschungsgemeinschaft with 1.3 million euros for his project CAVE.
Researchers from Bochum are particularly quick at finding security vulnerabilities in IT systems. Their trick: they focus on the essentials – and explain it with the theorem of the infinitely typing monkeys.
Researchers from Bochum are particularly quick at finding security vulnerabilities in IT systems. Their trick: they focus on the essentials.