MENU

Finding security vulnerabilities

2015. But only a fraction of these cases are ever reported and thereby registered for the statistics. For this period, the BKA reported a total of nearly ... with Dirk Kretzschmar Deutsche Telekom cyber attacks A large-scale cyber attack on routers has led to a failure of telephones, televisions and the internet ... Read more About Tatjana Brozat © Privat Tatjana Brozat is a lecturer at the TÜV North Akademie. IN A NUTSHELL: INFORMATION SECURITY IT security, data protection

Profile: Richard Gutjahr

following sentences: Social media are ... ... a blessing and a curse. A day without Wi-Fi is ... ... like a flower without water. The increasing networking ... How would you explain what you do for a living to a digital layman? I write stuff on the Internet. How many hours a day do you spend on the Internet? Si ... 05 July 2018 As a journalist, Richard Gutjahr uses the means of digitalisation very consciously. For example, by handing over a video shot during the attacks

Security by Design: Prevention is better than cure

by Design? TÜViT’s Markus Wagner explains in a brief interview why software and security go together in a networked world. Read more ABOUT © TÜV NORD Dirk ... view IT security as a necessary evil”, as Dirk Kretzschmar, Managing Director of TÜViT confirms. This conclusion is also supported by a study carried out ... their own IT. But there is still often a lack of strategy in order to reduce this risk – and in fact, only around a third of the companies have defined an

Alter Technology First mission Rosetta, then to Mars | #explore

15 February 2017 The Rosetta mission is unique in the history of space travel. After over ten years in space, the probe of the same name has covered 6 ... comet 67P/Churyumov-Gerasimenko, or “Chury” for short. ALTER TECHNOLOGY (ATN), a daughter company of the TÜV NORD GROUP, was significantly involved in the success ... components of the satellite systems? It is important to note that space is a hostile and unique environment for electronic devices. The radiation emitted

Living in space

three leisure modules. There’s a sleeping module, a kitchen module and a living quarters module, a laboratory, a greenhouse and a workshop. All the modules ... is to find out more about the group dynamics on such a mission: How does a group develop over such a long period of time under conditions of extreme isolation; ... also depend on our being a good fit in terms of our character traits. After all, bit of training doesn’t turn a lone wolf into a team player overnight. What

What is Privacy by Design?

say users. However, if a website is used to create a relationship with a natural person, then the electronic privacy directive, as a special standard, takes ... by Design? TÜViT’s Markus Wagner explains in a brief interview why software and security go together in a networked world. Read more Coloures-Pic/Fotolia ... protection of the users. In a contract with an online retailer , for instance, these might be name, address and bank account details. "A company may only collect

Our eye in space | #explore

own sun went through a period like this a long time ago, and now we have the technology to see the beginning of another star’s history.” © NASA ESA CSA STScI ... its beginnings. The relatively short history of the James Webb Space Telescope – known as Webb or JWST for short – is a story of superlatives. Originally ... room of the stars Webb’s sensors are a hundred times more sensitive than Hubble’s and, because infrared light has a longer wavelength, they can see through

Six failed inventions | #explore

computer offered only a rudimentary augmented reality feature, a short battery life and a mediocre camera. And because it took no more than a blink to trigger ... affordability of its blank tapes, a wider range of films, the generous issuing of licences to other manufacturers, and, as a result, a greater choice of affordable ... January 2021 They may be impractical, not yet mature, a bit weird, too expensive, too late or - in a few rare cases - even ahead of their time: inventions

How do atomic clocks work? | #explore

red second hand has made a full lap around the dial, it stops for a moment – only to suddenly jump forward two seconds and start a new round. The station ... have an impulse generator and a counter to count the beats. But unlike a grandfather clock, it is not the oscillation of a pendulum that sets the pace, ... First, the caesium is evaporated in a furnace, then its atoms are sorted by a magnetic field: Excited caesium atoms in a more highly energetic state are “screened

What is a smart meter gateway?

reached here before the power supply to a household can be cut off. If a cyber-attacker were to be able to use a swarm attack to flip all the switches of ... by Design? TÜViT’s Markus Wagner explains in a brief interview why software and security go together in a networked world. Read more iStock Before we start ... meter systems as a way of destabilising the electricity grid. In some European countries, remote-off switches, which can be used to unplug a household from