Jump to navigation

Logo RUB
  • Energiesparen
  • Studium
  • Forschung
  • Transfer
  • News
  • Über uns
  • Einrichtungen
 
MENÜ
  • RUB-STARTSEITE
  • News
  • Wissenschaft
  • Studium
  • Transfer
  • Leute
  • Hochschulpolitik
  • Kultur und Freizeit
  • Vermischtes
  • Servicemeldungen
  • Serien
  • Dossiers
  • Bildergalerien
  • Presseinformationen
    • Abonnieren
  • RUB in den Medien
  • Rubens
  • Rubin
    • Abonnieren
    • Printarchiv
  • Archiv
  • English
  • Redaktion

Newsportal - Ruhr-Universität Bochum

Dossier

IT security

Digital networking now permeates almost all areas of life. Developing protective mechanisms is an urgent task.

Porträt
ERC Advanced Grant

A fresh approach to new and secure encryption

Funded by the European Research Council with 2.5 million euros, Gregor Leander is developing new encryption methods. He wanders off the beaten track and doesn’t simply rely on the principle of trial and error.

30. März 2023 | Presseinformation
Eine Person dreht einen Knopf an einem Messgerät.
Side-channel attacks

When the chip needs a cooling break

Many encryption algorithms are mathematically proven to be one hundred per cent secure. Nevertheless, they sometimes fail to protect confidential data. This is because encryption doesn’t happen merely in theory.

23. März 2023 | News
Eine Hand hält einen goldenen Chip
IT security

Detecting manipulations in microchips

Attackers have the ability not only to manipulate software, but also to tamper with the hardware. A team from Bochum is devising methods to detect such tampering.

20. März 2023 | Presseinformation
Mann lehnt an Wand
Data security

The telltale zero

Attacks on the TLS protocol are both rare and highly complex. And yet, the encryption experts at Ruhr University Bochum are constantly tracking down new ones.

9. März 2023 | News
Eine Person hält eine Drohne in der Hand.
IT security

Security vulnerabilities detected in drones made by DJI

Drones shouldn’t be able to fly over airports and should have a unique serial number. In theory.

2. März 2023 | Presseinformation
Ein Autolenkrad mit einem Touchdisplay daneben
Computer science

Three tough nuts for quantum computers to crack

Algorithms made in Bochum are becoming the global standard for secure encryption in the age of quantum computing. They’ve arrived just in time.

24. Februar 2023 | News
Das Wissenschaftlerteam
Cryptography

Security with an in-built vulnerability

Secret services want to know as much as possible. For example, they try to circumvent data encryption. This can cause collateral damage, warn Bochum researchers.

18. Januar 2023 | News
Pascal Sasdrich Porträt
IT Security

A new Emmy Noether group aims to make hardware chips provably secure

Pascal Sasdrich will be funded by the Deutsche Forschungsgemeinschaft with 1.3 million euros for his project CAVE.

13. Januar 2023 | Presseinformation
Hardware auf einem Tisch
IT Security

Intelligent monkeys

Researchers from Bochum are particularly quick at finding security vulnerabilities in IT systems. Their trick: they focus on the essentials – and explain it with the theorem of the infinitely typing monkeys.

14. Dezember 2022 | News
Zwei Personen diskutieren über Hardware, die auf einem Tisch liegt.
IT Security

Identifying software vulnerabilities quickly and efficiently

Researchers from Bochum are particularly quick at finding security vulnerabilities in IT systems. Their trick: they focus on the essentials.

14. Dezember 2022 | Presseinformation
Felix Schuster
Interview

Shielded data processing in the cloud

Using cloud services without running into trouble with the GDPR – the company Edgeless Systems makes it possible. Founder Dr. Felix Schuster reflects on the somewhat difficult entry into a new market.

12. Oktober 2022 | News
Kita-App auf Smartphone
IT security

How daycare apps can spy on parents and children

Researchers reviewed 42 apps and found privacy and security deficiencies, some of which were quite serious. Some apps even sell their users’ data to third parties.

7. Juli 2022 | Presseinformation
PIN-Eingabe auf Kartenlesegerät
IT security

When the hardware traps criminals

Up to now, protecting hardware against manipulation has been a laborious business: expensive, and only possible on a small scale. And yet, two simple antennas might do the trick.

7. Juni 2022 | News
Platine mit Antennen
IT Security

Radio waves for the detection of hardware tampering

Up to now, protecting hardware against manipulation has been a laborious business: expensive, and only possible on a small scale. And yet, two simple antennas might do the trick.

7. Juni 2022 | Presseinformation
Wi-Fi-Router mit IRShield
IT Security

New countermeasure against unwanted wireless surveillance

Wirelessly functioning devices are omnipresent in our households. However, wireless communication endangers our privacy: Passive eavesdroppers are able to obtain sensitive data through intercepted high-frequency signals.

24. Mai 2022 | Presseinformation
<div>
	Lea Schönherr ist Expertin für die Analyse von Audiodateien. Joel Frank ist spezialisiert auf KI-Algorithmen.</div>
IT Security

Identifying fake voice recordings

Artificial intelligence can imitate people’s voices. Scammers are already taking advantage of this on the phone. A team in Bochum is working on a solution.

20. Dezember 2021 | Presseinformation
Person mit Laptop in der Hand
IT Security

14 new attacks on web browsers detected

Using so-called XS-Leaks, personal data can be accessed on the web. Many browsers are affected.

2. Dezember 2021 | Presseinformation
Android-Entsperrmuster
IT security

How Android unlocking patterns could be made more secure

Popular unlocking patterns are often in the shape of a letter – and are easy to guess. A bad thing if someone loses their mobile phone and it ends up in the wrong hands.

23. Juli 2021 | Presseinformation
Handy mit Signal-App
IT security

What users think about the PIN function of the messaging app Signal

For data protection reasons, the messaging app Signal is becoming ever more important. Unlike WhatsApp, the Signal app asks you to create a PIN during setup. But why?

14. Juli 2021 | Presseinformation
Handy mit Login-Bildschirm
IT Security

What users think about logging in without a password

Logging into an online shop without a password, using only the fingerprint? In this situation, it’s not surprising that users have the impression that their biometric data is transmitted to the website.

22. Juni 2021 | Presseinformation

Seiten

  • 1
  • 2
  • 3
  • ›
  • »
 
Mehr Dossiers
Dossiers
 
Zur Startseite
News
  • A-Z
  • N
  • K
Logo RUB
Impressum | Kontakt
Ruhr-Universität Bochum
Universitätsstraße 150
44801 Bochum

Datenschutz
Barrierefreiheit
Impressum
Schnellzugriff
Service und Themen
Anreise und Lagepläne
Hilfe im Notfall
Stellenangebote
Social Media
Facebook
Twitter
YouTube
Instagram
Seitenanfang y Kontrast N
Impressum | Kontakt