A hacker demonstrates that code can be hidden inside a new computer to put it forever under remote control, even after upgrades to the hard drive or operating system.
Tom SimoniteFollow @twitterapi
IT Editor, Software & Hardware
I’m MIT Technology Review’s IT editor for hardware and software and enjoy a diverse diet of algorithms, Internet, and human-computer interaction with chips on the side. Working in our San Francisco office, I cover new ideas about what computers can do for us, whether they spring from tech giants, new startups, or academic labs.
My journey to the West Coast started in a small English town called Wantage and took in the University of Cambridge, Imperial College London, and five years writing and editing technology news coverage at New Scientist magazine.
Tom Simonite's Stories
Is the computer security community so obsessed with demonstrating scary new attacks that it has neglected to improve defenses?
The Internet should be adapted to allow for oversight by the National Security Agency, the organization's boss says.
HTML5, which enables Web pages to mimic conventional software, also introduces new security problems.
At this year's Black Hat hacker conference in Las Vegas, attention turns from defense to offense.
Adding a camera to a stylus could let it interact with any device—even one without a touch screen.
The computer industry's future depends on a behind-schedule technology that's proving tough to get working.
The company's Chrome browser and Drive storage app arrive for iPad and iPhones—and could perhaps woo business customers.
The ad and search company launches a seven-inch tablet, called the Nexus 7, centered on consuming media.
A cryptography pioneer offers a simple way to fight electronic surveillance.