A study proves that software hosted in one part of the cloud can spy on software hosted nearby.
Tom SimoniteFollow @twitterapi
IT Editor, Software & Hardware
I’m MIT Technology Review’s IT editor for hardware and software and enjoy a diverse diet of algorithms, Internet, and human-computer interaction with chips on the side. Working in our San Francisco office, I cover new ideas about what computers can do for us, whether they spring from tech giants, new startups, or academic labs.
My journey to the West Coast started in a small English town called Wantage and took in the University of Cambridge, Imperial College London, and five years writing and editing technology news coverage at New Scientist magazine.
Tom Simonite's Stories
Content-centric networking promises to deliver content quicker and more reliably—but it may take time for companies to adopt it.
Apple might have made the touch screen ubiquitous, but Microsoft thinks hands-free interfaces will be just as big.
The U.S. government has pledged to retaliate quickly if power grids or other critical elements of infrastructure are hacked—but the technology needed to do so is lacking.
Critical infrastructure is at risk of a cyberattack because of systems that haven't kept pace with Internet threats.
The Trove search engine feeds on everything you and your friends have shared.
Millions of passwords have been stolen from companies such as LinkedIn and Yahoo. A new approach aims to prevent future heists.
Trying to match Google's immense index of the Web would be very costly—but Facebook could instead build search on top of the data we've already given it.
The company's data stockpile and investment in AI means a smartphone helper that answers queries before you even ask them.
Apple's unpolished maps app has proved just how much smartphone users rely on good directions.