Ruhr-Universitaet-Bochum

Ruhr University Bochum was founded in 1962 as part of the new university plan in Germany post WWII. Today, Ruhr University Bochum has approximately 34,000 students. The university offers more than 150 study programs, and is noted as one of the contenders for elite universities in academia and research quality. The Faculties of Medicine, Biology and Biotechnology, Engineering, (mechanical, civil, electrical) and Physics and Astronomy are deemed exceptional by most ranking panels.

Address
Pressestelle, Universitatsstr, 150, 44801 Bochum, Gebaude UV 3/368 Germany
Website
http://www.ruhr-uni-bochum.de/index_en.htm
Wikipedia
http://en.wikipedia.org/wiki/University_of_Bochum
Some content from Wikipedia, licensed under CC BY-SA

Telecom

A backdoor in mobile phone encryption from the '90s still exists

The encryption algorithm GEA-1 was implemented in mobile phones in the 1990s to encrypt data connections. Since then, it has been kept secret. Now, a research team from Ruhr-Universität Bochum (RUB), together with colleagues ...

Telecom

Security gap allows eavesdropping on mobile phone calls

Calls via the LTE mobile network, also known as 4G, are encrypted and should therefore be tap-proof. However, researchers from the Horst Görtz Institute for IT Security (HGI) at Ruhr-Universität Bochum have shown that this ...

Security

Fourteen new types of attacks on web browsers detected

IT security experts have identified 14 new types of attacks on web browsers that are known as cross-site leaks, or XS-Leaks. Using XS-Leaks, a malicious website can grab personal data from visitors by interacting with other ...

Robotics

Security vulnerabilities detected in drones made by DJI

Researchers from Bochum and Saarbrücken have detected security vulnerabilities, some of them serious, in several drones made by the manufacturer DJI. These enable users, for example, to change a drone's serial number or ...

Security

How secure are four and six-digit mobile phone PINs?

A German-American team of IT security researchers has investigated how users choose the PIN for their mobile phones and how they can be convinced to use a more secure number combination. They found that six-digit PINs actually ...

Hardware

Radio waves for the detection of hardware tampering

As far as data security is concerned, there is an even greater danger than remote cyberattacks: namely tampering with hardware that can be used to read out information—such as credit card data from a card reader. Researchers ...

Consumer & Gadgets

When speech assistants listen even though they shouldn't

Researchers from Ruhr-Universität Bochum (RUB) and the Bochum Max Planck Institute (MPI) for Cyber Security and Privacy have investigated which words inadvertently activate voice assistants. They compiled a list of English, ...

Computer Sciences

How voice assistants follow inaudible commands

An attack against speech recognition systems with manipulated audio files used to work only via a data interface. Now, all it takes is playing the secret messages via loudspeakers.

Hardware

Detecting manipulations in microchips

Attackers have the ability not only to manipulate software, but also to tamper with the hardware. A team from Bochum is devising methods to detect such tampering.

page 1 from 4