Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
A hacking group accused of being operated by the Chinese army now seems to be going after industrial control systems.
Academic advances suggest that the encryption systems that secure online communications could be undermined in just a few years.
Researchers show how easy it is to hide code in online ads that can turn people into an online attack squad.
New research from Black Hat shows it’s possible to trick water and energy infrastructure to cause physical damage—and securing these systems remains painfully slow.
There are tight controls on the NSA’s access to U.S. phone records and data from U.S. Internet companies, the agency’s director says.
Is the computer security community so obsessed with demonstrating scary new attacks that it has neglected to improve defenses?
HTML5, which enables Web pages to mimic conventional software, also introduces new security problems.
The automated system designed to keep malware out of Google’s app store proves easy to evade.
A malicious Wi-Fi network could command devices to report future movements—and perhaps snoop on private data.
Near-field communication chips may let smartphones replace cash and credit cards—but they could also offer opportunities to hackers.