Jump to navigation
Digital networking now permeates almost all areas of life. Developing protective mechanisms is an urgent task.
Lights out, doors open, online orders out: in a networked home, everything is controlled by voice or by pressing a smartphone button. But so far little thought has been given to who should be able to press which buttons.
Major success in Bochum: two Clusters of Excellence go to Ruhr-Universität.
Researchers can hide secret commands for voice assistants in spoken sentences, birds’ twittering, or music. They are not audible to the human ear. The machine recognises them precisely.
Most notably, the number of cookie notices has skyrocketed. However, they often do not meet the legal requirements.
Anyone who needs to access data on the workplace server from their home office, for example, has to rely on a secure connection that “IPsec” is supposed to ensure.
In IT security, users play a pivotal role. Angela Sasse was among the first researchers to hold this view.
Security gaps in the standard encryptions enable attackers to read confidential emails.
In future, this technology might help verify if countries abide by disarmament treaties.
It takes more than technological innovation to develop functional mechanisms for IT security and privacy.
Mobile phone networks can be used to control wind power stations. This carries risks.