Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
After an attack that required staggering skill and resources, the company threatens to quit China.
Revelations that the NSA has compromised hardware for surveillance highlights the vulnerability of computer systems to such attacks.
Attackers made sophisticated use of social media sites to steal Indian government data.
Stuxnet-like code found on industrial machines in Europe may have performed reconnaissance in preparation for attack.
Keith Alexander explains how the U.S. will fight espionage and crime.
Technologies that make life easier also make it simpler to track your every move, warned Technology Review in 1985.
The accelerometers on many phones are sensitive enough to allow surveillance via vibrations, say researchers.