Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
A hacking group accused of being operated by the Chinese army now seems to be going after industrial control systems.
Academic advances suggest that the encryption systems that secure online communications could be undermined in just a few years.
There are tight controls on the NSA’s access to U.S. phone records and data from U.S. Internet companies, the agency’s director says.
New research from Black Hat shows it’s possible to trick water and energy infrastructure to cause physical damage—and securing these systems remains painfully slow.
Big problems could be ahead if we rely on conclusions drawn from individuals’ social-networking data.
A researcher discloses the details of the major flaw he discovered earlier this year.
A security expert shows how some small flaws could give a hacker access to personal files.
A computer security researcher demonstrates attacks on cash machines.
New attacks highlight the growing threat to smart phones.