Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
Cloud password cracker is a sign of things to come.
Many users like using devices for authentication. But is it safe?
The U.S. government has pledged to retaliate quickly if power grids or other critical elements of infrastructure are hacked—but the technology needed to do so is lacking.
Experts find way to modify controls within Amazon’s cloud service, but the hole is quickly plugged.
A shadowy industry lets spammers and other cybercriminals pay their way into your computer.
Security technologies make compromising computers hard, but not hard enough.
New software aims to expose mobile malware by monitoring a device’s memory usage.
A researcher has shown that attacks on a long-standing mobile phone standard are possible.
Software that deciphers botnet communications could help infiltrate criminals’ networks.