A malicious Wi-Fi network could command devices to report future movements—and perhaps snoop on private data.
Tom SimoniteFollow @twitterapi
IT Editor, Software & Hardware
I’m MIT Technology Review’s IT editor for hardware and software and enjoy a diverse diet of algorithms, Internet, and human-computer interaction with chips on the side. Working in our San Francisco office, I cover new ideas about what computers can do for us, whether they spring from tech giants, new startups, or academic labs.
My journey to the West Coast started in a small English town called Wantage and took in the University of Cambridge, Imperial College London, and five years writing and editing technology news coverage at New Scientist magazine.
Tom Simonite's Stories
Near-field communication chips may let smartphones replace cash and credit cards—but they could also offer opportunities to hackers.
At this year's Black Hat hacker conference in Las Vegas, attention turns from defense to offense.
The cloud computing giant has snapped up Nicira, a startup developing smarter computer networking.
The social network needs to make mobile apps pay. Ads that use phone sensors to understand a person's surroundings could be the answer.
The ad and search company launches a seven-inch tablet, called the Nexus 7, centered on consuming media.
Three brains behind Google's failed collaboration service think your e-mail should work like a social network's news feed—and they might be right.
Laws haven't kept up with the company's ability to mine its users' data.
The company's social scientists are hunting for insights about human behavior. What they find could give Facebook new ways to cash in on our data—and remake our view of society.
Niche search engines Blekko and DuckDuckGo have exploded in popularity in recent months.