Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
Revelations that the NSA has compromised hardware for surveillance highlights the vulnerability of computer systems to such attacks.
Stuxnet-like code found on industrial machines in Europe may have performed reconnaissance in preparation for attack.
The accelerometers on many phones are sensitive enough to allow surveillance via vibrations, say researchers.
Keith Alexander explains how the U.S. will fight espionage and crime.
Attackers made sophisticated use of social media sites to steal Indian government data.
After an attack that required staggering skill and resources, the company threatens to quit China.