Academic advances suggest that the encryption systems that secure online communications could be undermined in just a few years.
Tom SimoniteFollow @twitterapi
IT Editor, Software & Hardware
I’m MIT Technology Review’s IT editor for hardware and software and enjoy a diverse diet of algorithms, Internet, and human-computer interaction with chips on the side. Working in our San Francisco office, I cover new ideas about what computers can do for us, whether they spring from tech giants, new startups, or academic labs.
My journey to the West Coast started in a small English town called Wantage and took in the University of Cambridge, Imperial College London, and five years writing and editing technology news coverage at New Scientist magazine.
Tom Simonite's Stories
Researchers show how easy it is to hide code in online ads that can turn people into an online attack squad.
New research from Black Hat shows it’s possible to trick water and energy infrastructure to cause physical damage—and securing these systems remains painfully slow.
There are tight controls on the NSA’s access to U.S. phone records and data from U.S. Internet companies, the agency’s director says.
Reputation.com says it’s ready to unveil a place where people can offer personal information to marketers in return for discounts and other perks.
Phones, tablets, and PCs can play online video on a TV set using Google’s cheap Chromecast device.
Microsoft aims to simplify home automation with software that connects different Internet-enabled devices.
The founder of Microsoft says we have reached a "golden age" of computer science enabling more powerful assistant software.
Microsoft redesigned its systems to aid U.S. surveillance programs, but whether it did so voluntarily or under duress is unknown.
Software can let smartphones, Wi-Fi routers, and other hardware link up without centralized Internet service.