Page 2 - Ruhr-Universitaet-Bochum

Computer Sciences

Two new attacks break PDF certification

A security issue in the certification signatures of PDF documents has been discovered by researchers at Ruhr-Universität Bochum. This special form of signed PDF files can be used, for instance, to conclude contracts. Unlike ...

Software

Improving urban planning with virtual reality

What should the city we live in look like? How do structural changes affect the people who move around it? Cartographers at Ruhr University Bochum use virtual reality tools to explore these questions before a great deal of ...

Electronics & Semiconductors

Critical "Starbleed" vulnerability in FPGA chips identified

Field programmable gate arrays, FPGAs for short, are flexibly programmable computer chips that are considered very secure components in many applications. In a joint research project, scientists from the Horst Görtz Institute ...

Telecom

New countermeasure against unwanted wireless surveillance

Smart devices are supposed to make our everyday lives easier. At the same time, however, they are a gateway for passive eavesdropping. To prevent possible surveillance of the movement profile within one's home, researchers ...

Engineering

3D-printed surfaces inspired by nature

To survive in extreme habitats, many animals and plants have developed brilliant abilities that we otherwise only know from superheroes in movies. In most cases, their abilities are based on the extraordinary properties of ...

Consumer & Gadgets

How daycare apps can spy on parents and children

Daycare apps are designed to make everyday life in daycare centers easier. Parents can use them, for example, to access reports on their children's development and to communicate with teachers. However, some of these applications ...

Engineering

Monitoring nuclear weapons stockpiles with radio waves

An international research team has proposed a new method for monitoring nuclear disarmament treaties. The IT security experts developed a mechanism that uses radio waves to remotely monitor whether any changes are being made ...

page 2 from 4