Government departments, banks, and companies that operate critical infrastructure have fallen victim to badly crafted malware known as Mahdi.
Tom SimoniteFollow @twitterapi
IT Editor, Software & Hardware
I’m MIT Technology Review’s IT editor for hardware and software and enjoy a diverse diet of algorithms, Internet, and human-computer interaction with chips on the side. Working in our San Francisco office, I cover new ideas about what computers can do for us, whether they spring from tech giants, new startups, or academic labs.
My journey to the West Coast started in a small English town called Wantage and took in the University of Cambridge, Imperial College London, and five years writing and editing technology news coverage at New Scientist magazine.
Tom Simonite's Stories
The two companies seem fated to compete ever more fiercely over mobile computing.
A new social network is free from ads, but burdened with expectations.
A service called Mobilescope acts as a watchdog, alerting users when apps copy and transmit sensitive information.
The victim's Apple devices suddenly went dark last Friday. Similar attacks remain possible.
The movements of Android users let Google track live traffic—a service being extended to new countries and U.S. cities today.
Google's Petr Mitrichev is the all-time champion of competitive programming, a little-known sport where tech giants scout for talent.
Consumers get to use wireless data as they wish thanks to a $5 billion gamble by the search company.
HTML5, which enables Web pages to mimic conventional software, also introduces new security problems.
The automated system designed to keep malware out of Google's app store proves easy to evade.