Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
A hacker demonstrates that code can be hidden inside a new computer to put it forever under remote control, even after upgrades to the hard drive or operating system.
A hacking group accused of being operated by the Chinese army now seems to be going after industrial control systems.
Academic advances suggest that the encryption systems that secure online communications could be undermined in just a few years.
There are tight controls on the NSA’s access to U.S. phone records and data from U.S. Internet companies, the agency’s director says.
New research from Black Hat shows it’s possible to trick water and energy infrastructure to cause physical damage—and securing these systems remains painfully slow.
Researchers show how easy it is to hide code in online ads that can turn people into an online attack squad.
A conference presentation would have exposed flaws in some cash machines.
The difficulty of running nonapproved code on the iPhone has turned off security researchers–until now.