Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
Stuxnet-like code found on industrial machines in Europe may have performed reconnaissance in preparation for attack.
Keith Alexander explains how the U.S. will fight espionage and crime.
They get results by exploiting a social network’s trusting environment.
New software aims to expose mobile malware by monitoring a device’s memory usage.
IBM security tool searches for and destroys malicious code in the cloud.
Applications built on social networks may be the ideal way to distribute malicious code.
AT&T hopes to get businesses and consumers to subscribe to a new security service for their mobile devices.