Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
A researcher claims that toll transponders can be cloned, allowing drivers to pass for free.
A new program analyzes iPhone apps and finds the ones that are grabbing your data.
New software lets Android users see how apps are collecting their data, and restrict the behavior.
Phones don’t have to be smart to be vulnerable.
Researchers spent $5,000 buying Twitter accounts from spammers in an attempt to learn how to outwit them.
Researchers work to develop passwords so secret that only your unconscious mind knows them.
Researchers report signs that moneymaking malware common on PCs is being adapted to mobile phones and tablets.
A new standard that gives phones and PCs a bigger role in authentication could disarm attacks that rely on stealing passwords.
Co-founder—and now CEO—Tom Leighton plans data-prioritization trials with Ericsson and massive use of distributed devices for transmitting video.