Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
Researchers show that different Web programming interfaces can be combined to cloak online activity.
Malware authors are finding ways to make automated analysis harder for antivirus firms.
The accelerometers on many phones are sensitive enough to allow surveillance via vibrations, say researchers.
A new report concludes that a breach at a single certificate authority can undermine the security of the entire Internet.
Researchers are developing hacking drones that could build a wireless botnet or track someone via cell phone.
As other countries have discovered, businesses need encrypted communications.
An infrared camera could record which keys you pressed.
How Microsoft’s chief strategy officer views the future of our work spaces.
The explosion of mobile devices requires cloud-based solutions—and means that companies have to pick and choose what data they protect.
Even “strong” passwords have big weaknesses, so companies serious about security ought to rely on additional methods of authentication.