In the second half of 2018, the blockchain and cryptocurrency industry faced a major development: falling prices for cryptocurrencies. The impact was felt across the landscape, with rapid decline in public interest, the activity of the crypto community and traders, and in the related activity of cybercriminals. While this will certainly affect our forecasts for 2019, let’s see how the forecasts we made for this year worked out. Read Full Article
Satoshi Bomb
Let us discuss what defines the profitability of bitcoin mining, what principles for mining speed adaptation were initially embedded into it, and why these principles can lead to the failure of the cryptocurrency in the long run. Read Full Article
Rocket AI and the next generation of AV software
What would happen if we did the same thing that the respected AI experts did? We could come to agreements with other representatives in the cybersecurity area and create a joint project. Meet Rocket AV. Read Full Article
Five myths about machine learning in cybersecurity
Machine learning has long permeated all areas of human activity. I would like to warn about, or dispel, some of the misconceptions associated with the use of ML in the field of cybersecurity. Read Full Article
Can an inevitable evil be conquered?
Scanning an object (a file or web resource) with an Internet security program essentially comes down to making a binary decision: dangerous or safe? An antivirus engine puts forward the hypothesis that an object is malicious and then checks whether this is true or not. Since there are, unfortunately, no perfect antivirus solutions, errors can occur. Read Full Article