Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
Critical infrastructure is at risk of a cyberattack because of systems that haven’t kept pace with Internet threats.
At this year’s Black Hat hacker conference in Las Vegas, attention turns from defense to offense.
Botnets are a huge problem—one that can’t be solved without persuading recalcitrant owners of millions of infected private computers to take action.
A conference on cyber warfare in Tel Aviv reveals Israel’s weaknesses—but a strategy to solve them is already in hand.
A shadowy industry lets spammers and other cybercriminals pay their way into your computer.
Researchers created their own, imprisoned, network of zombie computers to better learn how to take down those at large on the Internet.
As more people carry the devices, technology firms are creating better security checks for bank transactions.
Attackers could manipulate poorly protected data to make money or cause blackouts.