Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
The “most technologically sophisticated” malware uses clever communications tricks and encryption to avoid disruption.
After a spate of hacking attacks, the Department of Homeland Security is promoting ways to make software more trustworthy.
Security experts say companies need new tactics to fight the next wave of cyberattacks.
A conference on cyber warfare in Tel Aviv reveals Israel’s weaknesses—but a strategy to solve them is already in hand.
The company blames China, but none of the evidence is definitive—which is the nature of such attacks.
Executives for Sony and Epsilon, an e-mail marketing company, insist that they had tight security before they lost consumer data.
Spammers could create new accounts more cheaply.
Data security scholar Eugene Spafford argues that the subject needs to be taken more seriously at the highest levels of companies.
Can a booming “crypto-currency” really compete with conventional cash?
After PlayStation Network was hacked into, the company should have been quicker to share information with users, experts say.