Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
A computer security researcher demonstrates attacks on cash machines.
A hacking group accused of being operated by the Chinese army now seems to be going after industrial control systems.
Phones don’t have to be smart to be vulnerable.
There are tight controls on the NSA’s access to U.S. phone records and data from U.S. Internet companies, the agency’s director says.
An influx of advanced malware will force big antivirus companies to either evolve or cede turf to a crop of startups.
Recent events have highlighted the fact that hackers, coders, and geeks are behind a vibrant political culture.
The U.S. government has pledged to retaliate quickly if power grids or other critical elements of infrastructure are hacked—but the technology needed to do so is lacking.