Techniques used by government-backed malware are surfacing in the code used by ordinary cyber criminals.
Tom SimoniteFollow @twitterapi
IT Editor, Software & Hardware
I’m MIT Technology Review’s IT editor for hardware and software and enjoy a diverse diet of algorithms, Internet, and human-computer interaction with chips on the side. Working in our San Francisco office, I cover new ideas about what computers can do for us, whether they spring from tech giants, new startups, or academic labs.
My journey to the West Coast started in a small English town called Wantage and took in the University of Cambridge, Imperial College London, and five years writing and editing technology news coverage at New Scientist magazine.
Tom Simonite's Stories
Desktop computers with detachable screens that can be used like oversized tablets are in development and are intended for home and work use.
Accounts for mobile apps and social accounts could be at risk.
The two companies seem fated to compete ever more fiercely over mobile computing.
An ambitious European project wants to build super-real simulations to help predict the future.
The Gauss malware uncovered last week features a mystery payload.
Did spies or criminals make a sophisticated new malware targeting Lebanese banks?
Mining workers' messages for emotional trends could help managers monitor morale, but the technology struggles with humor.
A new technique could help companies like Facebook make money from your data without putting it at risk.
A hacker demonstrates that code can be hidden inside a new computer to put it forever under remote control, even after upgrades to the hard drive or operating system.