Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
An Android phone’s approach to security is radically different from an iPhone’s–but is it better?
They get results by exploiting a social network’s trusting environment.
Security technologies make compromising computers hard, but not hard enough.
The user is the weakest link for financial security.
A study highlights efforts to take down ISPs that allow malicious activity.
Verayo is harnessing unique manufacturing flaws to make RFID tags that are impossible to copy.
Security firm aims to make installing updates as painless and invisible as possible.
New software aims to expose mobile malware by monitoring a device’s memory usage.
A kit lets beginners craft sophisticated attacks.