Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
The more unusual your username, the easier marketers and scammers can build a profile of you.
Phones don’t have to be smart to be vulnerable.
Researchers created their own, imprisoned, network of zombie computers to better learn how to take down those at large on the Internet.
Attackers could manipulate poorly protected data to make money or cause blackouts.
Industrial computer systems are typically far less secure than they should be, experts say.
Many apps collect and share sensitive data, and the developers may not even realize it.
The technology could open up all kinds of opportunities for attackers, researchers say.