Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
Three hackers seeking to improve smart-phone security decided to forge their own path. Now their company boasts 10 million users.
Research projects at the Pentagon highlight the need to prevent data theft that happens within an organization’s walls.
The unusual activity generated by zombie computer networks can lead security experts right to them.
“Invisible” servers let governments quietly intercept and modify their citizens’ online communications.
The variety of devices running Google’s mobile OS on different networks makes security more complex.
A startup is offering free encrypted voice and text communications to protesters in Egypt.
The more unusual your username, the easier marketers and scammers can build a profile of you.
A new program analyzes iPhone apps and finds the ones that are grabbing your data.
Computer criminals may have a new target: the office printer.
A researcher creates a botnet for your pocket—a likely sign of things to come.