Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
A hacking group accused of being operated by the Chinese army now seems to be going after industrial control systems.
There are tight controls on the NSA’s access to U.S. phone records and data from U.S. Internet companies, the agency’s director says.
An influx of advanced malware will force big antivirus companies to either evolve or cede turf to a crop of startups.
Recent events have highlighted the fact that hackers, coders, and geeks are behind a vibrant political culture.
The U.S. government has pledged to retaliate quickly if power grids or other critical elements of infrastructure are hacked—but the technology needed to do so is lacking.
Critical infrastructure is at risk of a cyberattack because of systems that haven’t kept pace with Internet threats.
Millions of passwords have been stolen from companies such as LinkedIn and Yahoo. A new approach aims to prevent future heists.
Is the computer security community so obsessed with demonstrating scary new attacks that it has neglected to improve defenses?