Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
Researchers report signs that moneymaking malware common on PCs is being adapted to mobile phones and tablets.
Researchers call for changes in how software patches are distributed.
A system used by ships worldwide to broadcast their location for safety purposes lacks security controls and is vulnerable to spectacular spoofing attacks, researchers show.
CrowdStrike says it can help U.S. companies identify the companies that benefit from stolen data.
A custom version of Android exerts total control over what you can do, depending on where you are and what apps or networks you are using.
Is the computer security community so obsessed with demonstrating scary new attacks that it has neglected to improve defenses?
The first device running the defensive code, a Cisco IP phone, will be unveiled this week.
Tools that connect websites can also open up new security vulnerabilities, experts say.
Hardware bugs could be avoided by limiting chips to tested behaviors.