New research from Black Hat shows it’s possible to trick water and energy infrastructure to cause physical damage—and securing these systems remains painfully slow.
Tom SimoniteFollow @twitterapi
IT Editor, Software & Hardware
I’m MIT Technology Review’s IT editor for hardware and software and enjoy a diverse diet of algorithms, Internet, and human-computer interaction with chips on the side. Working in our San Francisco office, I cover new ideas about what computers can do for us, whether they spring from tech giants, new startups, or academic labs.
My journey to the West Coast started in a small English town called Wantage and took in the University of Cambridge, Imperial College London, and five years writing and editing technology news coverage at New Scientist magazine.
Tom Simonite's Stories
There are tight controls on the NSA’s access to U.S. phone records and data from U.S. Internet companies, the agency’s director says.
Reputation.com says it’s ready to unveil a place where people can offer personal information to marketers in return for discounts and other perks.
See the best new ideas in computer graphics and interaction from last week’s Siggraph conference.
Phones, tablets, and PCs can play online video on a TV set using Google’s cheap Chromecast device.
GitHub has created a social network where programmers get together and get work done without bosses, e-mails, or meetings.
Microsoft aims to simplify home automation with software that connects different Internet-enabled devices.
The founder of Microsoft says we have reached a "golden age" of computer science enabling more powerful assistant software.
Microsoft redesigned its systems to aid U.S. surveillance programs, but whether it did so voluntarily or under duress is unknown.
Software can let smartphones, Wi-Fi routers, and other hardware link up without centralized Internet service.