Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
Near-field communication chips may let smartphones replace cash and credit cards—but they could also offer opportunities to hackers.
Two programmers reveal covert ways to automate characters in an immensely popular game.
Researchers claim to be able to hijack cell-phone data connections.
A new technique lets hackers targeting Apple’s OS X cover their tracks more effectively.
How an outdated algorithm put secure Internet transactions at risk.
Cryptographers will compete to define a new standard.
A smart card’s RFID chip reveals the algorithms that control it.
A researcher claims that toll transponders can be cloned, allowing drivers to pass for free.
A reconfigurable handheld device could foster a community of hardware hackers.
Phone companies should consider the recent hack of the Apple iPhone a wake-up call for better mobile security.