Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
A home science experiment that probed billions of Internet devices reveals that thousands of industrial and business systems offer remote access to anyone.
Revelations that the NSA has compromised hardware for surveillance highlights the vulnerability of computer systems to such attacks.
Researchers report signs that moneymaking malware common on PCs is being adapted to mobile phones and tablets.
The closure of two “ultra-private” e-mail services shows just how weak the system really is.
Millions of passwords have been stolen from companies such as LinkedIn and Yahoo. A new approach aims to prevent future heists.
Researchers work to develop passwords so secret that only your unconscious mind knows them.
Smartphone apps that send disappearing messages are gaining in popularity.
A new standard that gives phones and PCs a bigger role in authentication could disarm attacks that rely on stealing passwords.
Can a booming “crypto-currency” really compete with conventional cash?