Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Identify reputable sources - that's how it works!
Security Awareness

Identify reputable sources - that's how it works!

We explain some tips on how you can identify reputable sources in the flood of information on the Internet and unmask fake news.

Chris Wojzechowski Chris Wojzechowski Geschäftsführender Gesellschafter
Updated: September 30, 2024 3 min read read
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)

TL;DR

Identifying reputable sources requires verifying the actual institution behind a claim, not just an author name or news headline. Reliable publishers include federal ministries and universities, but even these can be falsely cited. If a news item cannot be found across multiple credible outlets, its reliability is in question. Research consistently shows fake news spreads most rapidly on social media, often when it can be used against a perceived opposing side. When in doubt, do not share unverified information.

Table of Contents (2 sections)

Finding reputable sources that cover current topics has become very difficult. The reason for this is that there are countless sources, some of which include some that distribute false information. You should pay attention to the points presented here, so that you can identify serious sources.

Identify serious sources

The best way to identify a reputable source is to know who has collected this information and is behind the information. Serious publishers include federal ministries, but also institutes or other areas of universities are considered serious. If you find a research result of a university on a news website, you should check whether the university in question is actually responsible for the information presented, or whether the news website simply claims that the results come from the university. Just because an author is mentioned on another website, this person is not necessarily the author of the report. The false naming of the author is a criminal offence, but it cannot be detected immediately. Therefore it can be possible for criminals to spread false reports by using a false author. In a previous article we have already analyzed how to recognize fake news, but also fake profiles and thus determine the seriousness behind a message or unmask a fake profile and thus come across fake news. The ARD has already accompanied students who have received a workshop on how to better identify fake news in a report: https://www.youtube.com/watch?v=BL-vTyRI2Dw

Do not distribute fake news

The greatest danger behind dubious sources is the spread of false news, so-called fake news. As a result, fake news gets more attention and in turn is seen by more people. If you are not sure about a piece of information and cannot say for sure what source the original information came from, you should not spread such information further. Another important step in analyzing a news item should be to look for similar information on other sites. Big headlines are quickly picked up by several pages. If the information is in several reputable sources, you can trust them. Therefore, if you are not sure whether a news item is reputable, you should check 0b other reputable sites have published similar information. There is a lot of research in the area of fake news that brings mostly the same conclusion, and that is that they are spreading a lot through the social networks. As the Süddeutsche Zeitung reports, people spread fake news especially when it could harm the "other party".

Next Step

Our certified security experts will advise you on the topics covered in this article — free and without obligation.

Free · 30 minutes · No obligation

Share this article

About the author

About the Author

Chris Wojzechowski
Chris Wojzechowski

Geschäftsführender Gesellschafter

E-Mail

Geschäftsführender Gesellschafter der AWARE7 GmbH mit langjähriger Expertise in Informationssicherheit, Penetrationstesting und IT-Risikomanagement. Absolvent des Masterstudiengangs Internet-Sicherheit an der Westfälischen Hochschule (if(is), Prof. Norbert Pohlmann). Bestseller-Autor im Wiley-VCH Verlag und Lehrbeauftragter der ASW-Akademie. Einschätzungen zu Cybersecurity und digitaler Souveränität erschienen u.a. in Welt am Sonntag, WDR, Deutschlandfunk und Handelsblatt.

10 Publikationen
  • Einsatz von elektronischer Verschlüsselung - Hemmnisse für die Wirtschaft (2018)
  • Kompass IT-Verschlüsselung - Orientierungshilfen für KMU (2018)
  • IT Security Day 2025 - Live Hacking: KI in der Cybersicherheit (2025)
  • Live Hacking - Credential Stuffing: Finanzrisiken jenseits Ransomware (2025)
  • Keynote: Live Hacking Show - Ein Blick in die Welt der Cyberkriminalität (2025)
  • Analyse von Angriffsflächen bei Shared-Hosting-Anbietern (2024)
  • Gänsehaut garantiert: Die schaurigsten Funde aus dem Leben eines Pentesters (2022)
  • IT Security Zertifizierungen - CISSP, T.I.S.P. & Co (Live-Webinar) (2023)
  • Sicherheitsforum Online-Banking - Live Hacking (2021)
  • Nipster im Netz und das Ende der Kreidezeit (2017)
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
Certified ISO 27001ISO 9001AZAV

Cookielose Analyse via Matomo (selbst gehostet, kein Tracking-Cookie). Datenschutzerklärung