Computer security experts have failed to close a loophole that allows an attacker to easily download cryptographic keys from an encrypted computer.
Ever since the first hack of a commercial quantum cryptography device, security specialists have been fighting back. Here’s an update on the battle.
With cryptography, surveillance processes could be open and preserve privacy without undermining their investigative power.
A promising technique for synthetic biology is fraught with risks.
Statisticians have boasted of the benefits of big data. Now they’re discovering the weaknesses.
Another chance to catch the most interesting, and important, articles from the previous week on MIT Technology Review.
A roundup of the most interesting stories from other sites, collected by the staff at MIT Technology Review.
Using a mobile phone while driving can significantly increase the chances of an accident. Now a dashboard cam can spot when drivers pick up the phone.
… in much the same way as mainstream readers consume ordinary news, say computer scientists.
Quarantine for Cyberbullies: The Latest Strategy in the Fight Against Offensive Social Media Content
If people post offensive content, cutting off their contact to the network can prevent their messages from spreading, say network theorists.