Protection Without Encryption: Paradox or Alternative?
Is it possible to protect data without encryption? In 2025, as algorithms become outdated, quantum computing is on the rise, and most data breaches are caused by human…
Is it possible to protect data without encryption? In 2025, as algorithms become outdated, quantum computing is on the rise, and most data breaches are caused by human…
Exactly one year has passed since the world watched in awe as the investigation of one of the most sophisticated backdoors in Linux history unfolded. The story of the…
Hello, tekkix! We continue our series of reviews on laws, orders, decrees, and regulatory initiatives related to information security. In this article, we cover what…
This article is a translation of a blog post by Luciano Nooijen published on April 1, 2025
Good night to everyone :)
The neural networks’ consortium is pondering what exactly the user meant in their prompt – at least, that’s how I imagine it)
Holidays, public holidays, any "extra" days off - this is an opportunity for attackers to try to launch an attack. The attackers' calculation is simple: the fewer "defending"…
In this article, we will examine which methods of transmitting a password over the internet are the safest. Hashing passwords or the TLS protocol - which one to choose…
Hello, tekkix! This is Anton Komarov, I write for the MTS blog. I’ve already published several posts about repairing various devices—for example, a robot vacuum cleaner…
Today we’ll talk about a topic that sparks lively interest among many developers and AI enthusiasts — integrating large language models like DeepSeek or ChatGPT with…
I explain in detail with examples of creating infographics, editing interiors, prototyping websites, and advertising concepts, all done using simple text prompts.
Companies are increasingly turning to AI to transform their business processes. However, successful AI transformation requires not just automating individual tasks, but…
Hello everyone! This is Nikolai Yedomskiy, the head of the network engineering team at EDINOM TSUPIS.
This article discusses AI integration packages from Effect—a set of tools designed to simplify working with large language models in modern applications. It describes…
Hello! This is Masha from AppSec at Alfa-Bank. Recently, we held the first cybersecurity hackathon, which took place with the joint efforts of the IT, AppSec, Intranet,…
We at MWS have launched a language model aggregator, where you can work with multiple LLMs through a single interface. In MWS GPT, the following models are available:…
Julia here again, a systems analyst at EvApps, and we continue exploring WebSocket technology. In the first part, we learned the basics of WebSocket, and now let's look…