Women* in IT Security

Women* in IT Security

May 13, 2022

The more diverse the team, the more diverse its perspectives and approaches – CASA presents female role models in IT Security more

© PanCast’s architecture.
1. Beacons and user devices are registered with the backend.
2. User devices record encounters with BLE beacons.
3. Diagnosed users or healthy volunteers may upload their history of encountered beacons to the backend via a terminal.
3b. Optionally, health workers can manually feed inputs from users into the backend system.
4. The backend updates the risk database with uploaded encounters.
5. Risk information is periodically broadcast from the backend to network beacons, which broadcast the information to nearby user devices.

A blog post by Heiner Kremer, Ph.D. student in the Empirical Inference Department at MPI-IS more

Cryptocurrency, but secure

Cryptocurrency, but secure

November 04, 2021

The Heinz Nixdorf Foundation supports Clara Schneidewind's research group with 1.15 million euros more

Christof Paar receives Ring of Honour from the City of Bochum

This is in recognition of his commitment to IT security in Bochum. more

Uninvited listeners in your speakers

Language assistants are programmed to react to “Alexa”, “Hey Siri” and “OK Google”, but they also respond to a large number of other words, too more

Critical “Starbleed” vulnerability in FPGA chips

FPGA chips which are used, for example, in cloud data centers and mobile phone base stations have a vulnerable feature more

Go to Editor View