Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
Conventional security software is powerless against sophisticated attacks like Flame, but alternative approaches are only just getting started.
A home science experiment that probed billions of Internet devices reveals that thousands of industrial and business systems offer remote access to anyone.
The U.S. government is developing new computer weapons and driving a black market in “zero-day” bugs. The result could be a more dangerous Web for everyone.
Computer-security researcher Eugene Kaspersky says he is testing control software that won’t run malicious code.
Securing critical infrastructure needs to go far beyond the measures in President Obama’s recent executive order.
New details of the NSA’s capabilities suggest encryption can still be trusted. But more effort is needed to fix problems with how it is used.
A report on the Chinese group that breached the computers of U.S. companies reveals that they took few precautions against detection.
A researcher discloses the details of the major flaw he discovered earlier this year.
Recent infighting has done little to explain how Anonymous operates—or what drives it.
Dummy water-plant control systems rapidly attracted attention from hackers who tinkered with their settings—suggesting it happens to real industrial systems, too.