Critical infrastructure is at risk of a cyberattack because of systems that haven't kept pace with Internet threats.
Tom SimoniteFollow @twitterapi
IT Editor, Software & Hardware
I’m MIT Technology Review’s IT editor for hardware and software and enjoy a diverse diet of algorithms, Internet, and human-computer interaction with chips on the side. Working in our San Francisco office, I cover new ideas about what computers can do for us, whether they spring from tech giants, new startups, or academic labs.
My journey to the West Coast started in a small English town called Wantage and took in the University of Cambridge, Imperial College London, and five years writing and editing technology news coverage at New Scientist magazine.
Tom Simonite's Stories
The Trove search engine feeds on everything you and your friends have shared.
The threat may be theoretical—but compromised telecom equipment could quickly cripple a nation's civilian and military infrastructure.
Millions of passwords have been stolen from companies such as LinkedIn and Yahoo. A new approach aims to prevent future heists.
A powerful new approach to artificial intelligence is ready to improve many Google products.
With funding from the Amazon founder and the CIA's investment arm, the Canadian company D-Wave is gaining momentum for its revolutionary approach to computing.
Telepresence systems that let you go to work remotely have proved awkward to use. One startup thinks it has solved those problems.
Your data is most valuable when combined with what other companies know.
Techniques used by government-backed malware are surfacing in the code used by ordinary cyber criminals.
Desktop computers with detachable screens that can be used like oversized tablets are in development and are intended for home and work use.