A new generation of security software studies the way people normally access a database to identify hackers.
David TalbotFollow @twitterapi
I’m MIT Technology Review's chief correspondent, keeping an eye most often on the world of information and communication technologies—and asking my kids when I don’t understand what’s going on. Recent projects have taken me to Kenya to write about mobile-phone-based health initiatives, and Germany to explore how they’ll ramp up renewable power while closing down nuclear plants. My 2008 feature on the Obama campaign’s social-networking operation was selected for The Best Technology Writing 2009.
David Talbot's Stories
As part of an information system, even the lowly RFID tag is vulnerable.
Research sponsored by the Dept. of Homeland Security could help firms like Symantec protect consumers from online fraud.
Harvard, Oxford researchers aim to create Internet defensive strategies geared to consumers.
If someone steals your fingerprint, "cancelable biometrics" software from IBM can issue a new one.
These high-tech machines are no toys.
Houston's evacuation was chaotic and expensive -- and ultimately unnecessary. Is there a better way to predict hurricane paths?
Raytheon's troubled Patriot missile
Building the planes is easy. Making them autonomous, and constructing airborne communications networks, is not.