Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
A report on the Chinese group that breached the computers of U.S. companies reveals that they took few precautions against detection.
The first device running the defensive code, a Cisco IP phone, will be unveiled this week.
A custom version of Android exerts total control over what you can do, depending on where you are and what apps or networks you are using.
The U.S. government is developing new computer weapons and driving a black market in “zero-day” bugs. The result could be a more dangerous Web for everyone.
Computer-security researcher Eugene Kaspersky says he is testing control software that won’t run malicious code.
Is the computer security community so obsessed with demonstrating scary new attacks that it has neglected to improve defenses?
Recent infighting has done little to explain how Anonymous operates—or what drives it.
Tools that connect websites can also open up new security vulnerabilities, experts say.
Hardware bugs could be avoided by limiting chips to tested behaviors.