Quantcast
Channel: Robert Lemos – MIT Technology Review
Browsing all 122 articles
Browse latest View live

Probe Sees Unused Internet

A survey shows that addresses are not running out as quickly as we’d thought.In a little more than two years, the last Internet addresses will be assigned by the international group tasked with...

View Article



Sick Searchers Help Track Flu

Google releases a tool to track the intensity and spread of the flu.On Tuesday, search giant Google released an experimental tool that tracks the intensity and movement of the influenza virus across...

View Article

Obama's NASA Dilemma

The fate of the U.S. space program hangs in the balance.When president-elect Barack Obama takes office in January, he will be faced with a rare situation. Within his first 100 days, he will have to...

View Article

Giant Camera Tracks Asteroids

The camera will offer sharper, broader views of the sky.The first of four new asteroid-tracking telescopes will come online next month in Hawaii, promising to quickly scan large swaths of the...

View Article

Microsoft Searches for Group Advantage

A new search algorithm looks for connections between people.As part of its efforts to better compete with Google, Microsoft is plumbing the connections between searchers and their contacts to produce...

View Article


BIOS Maker Aims to Retake the PC

Phoenix Technologies is pushing its pint-size OS as a complement to Windows.Typically, PC users do not give the low-level software on their computers a second thought. Known as the basic input-output...

View Article

A Gallery of HyperSpace Screenshots

Phoenix Technologies is pushing its pint-size OS as a complement to Windows.

View Article

Are Your "Secret Questions" Too Easily Answered?

Research finds that the answers to secret questions used to retrieve forgotten passwords are easily guessed.Brian Green’s experience with not-so-secret questions began when he logged on to his World of...

View Article


iPhone Hackers Get a Break

The difficulty of running nonapproved code on the iPhone has turned off security researchers–until now.In March, the organizers of a computer-security conference called CanSecWest challenged attendees...

View Article


Firefox Aims to Unplug Scripting Attacks

How websites can block code from unknown sources.Sites that rely on user-created content can unwittingly be employed to attack their own users via JavaScript and other common forms of Web code. This...

View Article

Flaw Opens ATMs to Hackers

A conference presentation would have exposed flaws in some cash machines.Barnaby Jack, a security researcher at the computer networking giant Juniper, had planned to hack into an automatic teller...

View Article

Catching Spammers in the Act

Researchers show how spammers harvest e-mail addresses and send out bulk messages.Researchers have shed new light on the methods by which spammer harvest e-mail addresses from the Web and relay bulk...

View Article

Reporting for Duty

Tracking computer-security research and the ongoing evolution of cybercriminal techniques.Welcome to UnsafeBits, a blog discussing the latest in security research and documenting the ongoing...

View Article


Can Twitter and Facebook Be Both Social and Secure?

Nearly half of all companies block social networks, although only some recognize the security risks.

View Article

Virus Counting Is a Numbers Game

The malware seen by antivirus companies will jump by at least half this year. But what does that mean?Duck and cover.

View Article


A Contest to Train Cyber Combatants

Cyber-defense and capture-the-flag contests will help train future defenders of cyberspace.In the 1950s, shocked by the Russians’ launch of Sputnik, the United States embarked on an initiative to boost...

View Article

Researcher: Update and You're Owned

Hundreds of applications that use software updates are making computers more vulnerable to attack.

View Article


Firms Patch Some Bugs Quicker Than Others

Vulnerabilities in core software are dealt with quickly, while other applications have to wait.

View Article

Hunting Down Botnets

Data mining helps security researchers spot Internet addresses linked to compromised computers.

View Article

Going All In on MobileMe

An attack on the service shows how convoluted some hacks can become.A group of researchers from security firm SensePost just revealed a hack of Apple’s MobileMe service. Rather than demonstrating a...

View Article
Browsing all 122 articles
Browse latest View live




Latest Images