Home automation systems and networking equipment vulnerable to a major encryption flaw are unlikely to be fixed.
Tom SimoniteFollow @twitterapi
IT Editor, Software & Hardware
I’m MIT Technology Review’s IT editor for hardware and software and enjoy a diverse diet of algorithms, Internet, and human-computer interaction with chips on the side. Working in our San Francisco office, I cover new ideas about what computers can do for us, whether they spring from tech giants, new startups, or academic labs.
My journey to the West Coast started in a small English town called Wantage and took in the University of Cambridge, Imperial College London, and five years writing and editing technology news coverage at New Scientist magazine.
Tom Simonite's Stories
Samsung’s Galaxy S5 is the first smartphone that can use a fingerprint to authorize payments in stores and online.
A system called Mylar makes it possible to build online services that can never decrypt or leak your data.
Google manages to invest in fundamental research without having a traditional lab in which to do it.
Facebook’s new AI research group reports a major improvement in face-processing software.
A super-secure place for sensitive data to mingle could free companies to get the benefits of sharing it without risking leaks.
Academics at CMU will try to extend Yahoo’s services with mobile apps that act like personal assistants.
Google has no way to push updates to devices running Android software, making the devices vulnerable to malware.
Would you let a startup track your social media accounts and credit-card transactions in exchange for cash?
Small companies are showing that the technology we rely on can be redesigned to protect our data—and that consumers are interested.