Jump to navigation

Logo RUB
  • Studium
  • Forschung
  • Transfer
  • News
  • Über uns
  • Einrichtungen
 
MENÜ
  • RUB-STARTSEITE
  • News
  • Wissenschaft
  • Studium
  • Transfer
  • Leute
  • Hochschulpolitik
  • Kultur und Freizeit
  • Vermischtes
  • Servicemeldungen
  • Serien
  • Dossiers
  • Bildergalerien
  • Presseinformationen
    • Abonnieren
  • RUB in den Medien
  • Rubens
  • Rubin
    • Abonnieren
    • Printarchiv
  • Archiv
  • English
  • Redaktion

Newsportal - Ruhr-Universität Bochum

Dossier

IT Security

Digital networking now permeates almost all areas of life. Developing protective mechanisms is an urgent task.

Chips und Platinen
IT Security

How randomized data can improve our security

With an innovative approach, Bochum scientists and international colleagues are creating new standards for data security in the cache of electronic devices.

9. August 2023 | Presseinformation
Zwei Personen stehen lächelnd mit verschränkten Armen Rücken an Rücken in einem Treppenhaus
IT security

How do people really feel about electronic health records?

Many people with statutory health insurance don’t understand the digital infrastructure behind electronic health records. One issue in particular raises concerns.

8. August 2023 | Presseinformation
Zwei Personen mit einem würfelförmigen Gebilde in den Händen
IT security

Satellite security lags decades behind the state of the art

Researchers have tested the software of three satellites. And they found many standard security mechanisms missing.

11. Juli 2023 | Presseinformation
Kabel in leuchtendem Computergehäuse
Special edition

Science magazine Rubin on IT Security

Intelligent monkeys, mathematical lattice fences and holes in a computer housing: find out what they have to do with IT security in our Rubin special edition.

3. Juli 2023 | News
Shouldersurfing
The human factor

How safe do people around the world feel on the internet?

Who has ever been hit by cybercrime? How do people protect themselves from it? A survey reveals similarities and differences between different groups around the world.

27. Juni 2023 | News
Blick auf einen Monitor mit Bildern
Deep fake

This is how artificially generated images reveal their true colours

Humans often have no chance whatsoever of distinguishing artificially created images, audio or videos from the real deal. This is why researchers are working on automated recognition

23. Juni 2023 | News
Blick auf einen Monitor
IT-Security

Researchers discover vulnerabilities in Microsoft Office application

The problem affects signatures in Word documents, for example.

21. Juni 2023 | Presseinformation
Passworteingabe am Desktop
Dissertation

How to reconcile IT security and productivity

Uta Menges and Jonas Hielscher want to lift the label of being a nuisance from IT security measures and incorporate them more effectively into everyday life.

2. Juni 2023 | News
Kryptowährungsmünzen auf einem leuchtenden PC
Cryptocurrencies

Shared irresponsibility

Cryptocurrencies are not subject to centralised governance. The community holds the power – but fails to do all that needs to be done. As a result, the collateral of the currency might be at risk.

8. Mai 2023 | News
Eine Hand, die SIM-Karten herausdrückt
Start-up

Ready for the new generation of mobile communications

5G has plenty more to offer than 4G. Radix Security makes sure that it doesn’t leave any security gaps open.

3. Mai 2023 | News
Porträt
ERC Advanced Grant

A fresh approach to new and secure encryption

Funded by the European Research Council with 2.5 million euros, Gregor Leander is developing new encryption methods. He wanders off the beaten track and doesn’t simply rely on the principle of trial and error.

30. März 2023 | Presseinformation
Eine Person dreht einen Knopf an einem Messgerät.
Side-channel attacks

When the chip needs a cooling break

Many encryption algorithms are mathematically proven to be one hundred per cent secure. Nevertheless, they sometimes fail to protect confidential data. This is because encryption doesn’t happen merely in theory.

23. März 2023 | News
Eine Hand hält einen goldenen Chip
IT security

Detecting manipulations in microchips

Attackers have the ability not only to manipulate software, but also to tamper with the hardware. A team from Bochum is devising methods to detect such tampering.

20. März 2023 | Presseinformation
Mann lehnt an Wand
Data security

The telltale zero

Attacks on the TLS protocol are both rare and highly complex. And yet, the encryption experts at Ruhr University Bochum are constantly tracking down new ones.

9. März 2023 | News
Eine Person hält eine Drohne in der Hand.
IT security

Security vulnerabilities detected in drones made by DJI

Drones shouldn’t be able to fly over airports and should have a unique serial number. In theory.

2. März 2023 | Presseinformation
Ein Autolenkrad mit einem Touchdisplay daneben
Computer science

Three tough nuts for quantum computers to crack

Algorithms made in Bochum are becoming the global standard for secure encryption in the age of quantum computing. They’ve arrived just in time.

24. Februar 2023 | News
Das Wissenschaftlerteam
Cryptography

Security with an in-built vulnerability

Secret services want to know as much as possible. For example, they try to circumvent data encryption. This can cause collateral damage, warn Bochum researchers.

18. Januar 2023 | News
Pascal Sasdrich Porträt
IT Security

A new Emmy Noether group aims to make hardware chips provably secure

Pascal Sasdrich will be funded by the Deutsche Forschungsgemeinschaft with 1.3 million euros for his project CAVE.

13. Januar 2023 | Presseinformation
Hardware auf einem Tisch
IT Security

Intelligent monkeys

Researchers from Bochum are particularly quick at finding security vulnerabilities in IT systems. Their trick: they focus on the essentials – and explain it with the theorem of the infinitely typing monkeys.

14. Dezember 2022 | News
Zwei Personen diskutieren über Hardware, die auf einem Tisch liegt.
IT Security

Identifying software vulnerabilities quickly and efficiently

Researchers from Bochum are particularly quick at finding security vulnerabilities in IT systems. Their trick: they focus on the essentials.

14. Dezember 2022 | Presseinformation

Seiten

  • 1
  • 2
  • 3
  • ›
  • »
 
Mehr Dossiers
Dossiers
 
Zur Startseite
News
  • A-Z
  • N
  • K
Logo RUB
Impressum | Kontakt
Ruhr-Universität Bochum
Universitätsstraße 150
44801 Bochum

Datenschutz
Barrierefreiheit
Impressum
Schnellzugriff
Service und Themen
Anreise und Lagepläne
Hilfe im Notfall
Stellenangebote
Social Media
Facebook
Twitter
YouTube
Instagram
Seitenanfang y Kontrast N
Impressum | Kontakt