Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
Critical infrastructure is at risk of a cyberattack because of systems that haven’t kept pace with Internet threats.
After an attack that required staggering skill and resources, the company threatens to quit China.
A new approach does away with the need for long strings of letters and numbers.
Recent events have highlighted the fact that hackers, coders, and geeks are behind a vibrant political culture.
Instead of blocking attacks, a startup distracts attackers with false information.
A hacking group accused of being operated by the Chinese army now seems to be going after industrial control systems.
An influx of advanced malware will force big antivirus companies to either evolve or cede turf to a crop of startups.
There are tight controls on the NSA’s access to U.S. phone records and data from U.S. Internet companies, the agency’s director says.