Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
Interconnected computer systems provide openings for attackers.
Researchers show how to spot viruses on equipment like drug mixers and pregnancy monitors: by examining their power usage.
Government departments, banks, and companies that operate critical infrastructure have fallen victim to badly crafted malware known as Mahdi.
Malware authors are finding ways to make automated analysis harder for antivirus firms.
Stuxnet-like code found on industrial machines in Europe may have performed reconnaissance in preparation for attack.
Keith Alexander explains how the U.S. will fight espionage and crime.
They get results by exploiting a social network’s trusting environment.
New software aims to expose mobile malware by monitoring a device’s memory usage.
IBM security tool searches for and destroys malicious code in the cloud.