Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
A home science experiment that probed billions of Internet devices reveals that thousands of industrial and business systems offer remote access to anyone.
A new approach to encryption beats attackers by presenting them with fake data.
Conventional security software is powerless against sophisticated attacks like Flame, but alternative approaches are only just getting started.
A system used by ships worldwide to broadcast their location for safety purposes lacks security controls and is vulnerable to spectacular spoofing attacks, researchers show.
A super-secure place for sensitive data to mingle could free companies to get the benefits of sharing it without risking leaks.
New details of the NSA’s capabilities suggest encryption can still be trusted. But more effort is needed to fix problems with how it is used.
Dummy water-plant control systems rapidly attracted attention from hackers who tinkered with their settings—suggesting it happens to real industrial systems, too.
Researchers report signs that moneymaking malware common on PCs is being adapted to mobile phones and tablets.
Securing critical infrastructure needs to go far beyond the measures in President Obama’s recent executive order.
CrowdStrike says it can help U.S. companies identify the companies that benefit from stolen data.