Menu
Topics
The Big Story
Election 2020
Artificial Intelligence
Biotechnology
Blockchain
Climate Change
Computing
Humans and Technology
Tech Policy
Silicon Valley
Smart Cities
Space
Magazine
Read the latest issue
Read previous issues
Subscribe to the magazine
Manage your subscription
MIT News
Special interest publications
Newsletters
Coronavirus Tech Report
Daily Briefing
Artificial Intelligence
Future Economy
Space
Weekend Reads
View all newsletters
Events
EmTech
EmTech Digital
EmTech Next
Future Compute
CyberSecure
View events video
View all events
Log in / Create and account
Subscribe
Sign in
Search
Click search or press enter
Computer Security
25 Stories
Cyber attacks are inspiring new defenses for networks, personal computers, and smart phones.
Mobile Flaw Could Cloak Clicks
Researchers demonstrate that mobile phones are exceptionally vulnerable to a browser bait and switch.
August 17, 2010
How to Make an ATM Spit Out Money
A computer security researcher demonstrates attacks on cash machines.
July 29, 2010
Passwords that are Simple--and Safe
A new approach does away with the need for long strings of letters and numbers.
July 19, 2010
Phony Twitter Profiles Aim to Outwit Spammers
Approach could help software learn how to identify fake accounts with less honorable intentions.
July 9, 2010
The Achilles' Heel of Your Computer
Device drivers account for most crashes and even introduce security problems; a new testing tool could provide an early warning.
June 30, 2010
Cyber Security and the Risk of Cyber War
Experts talk about the growing threat of cyber crime, espionage, and warfare, and how to thwart it.
June 22, 2010
Security IP
June 22, 2010
Threats Create Opportunities
June 22, 2010
Bulletproofing Cryptography
June 22, 2010
Planetary Pestilence
June 22, 2010
Hope in Hardware
June 22, 2010
Global Gridlock on Cyber Crime
June 22, 2010
Testing for Trouble
June 22, 2010
Measuring Security
June 22, 2010
The Attacker's Advantage
June 22, 2010
Large-scale cyber attacks drive new defenses
June 22, 2010
Militarizing Cyberspace
To preserve the open Internet we must stop the cyber arms race.
June 22, 2010
Moore's Outlaws
Cyber attacks are increasing exponentially. Here’s what recent episodes can teach us about thwarting cyber crime, espionage, and warfare.
June 22, 2010
New Cyber Chief Outlines Strategy
Keith Alexander explains how the U.S. will fight espionage and crime.
June 10, 2010
Facebook Personal Data a Security Risk
Making more user information public has both privacy and security dangers, experts warn.
May 18, 2010
Patching the Security Update Process
Security firm aims to make installing updates as painless and invisible as possible.
March 10, 2010
Clinton Pressures China over Google Attack
Security researchers are also working to unravel the nature of the espionage.
January 22, 2010
Google Reveals Chinese Espionage Efforts
After an attack that required staggering skill and resources, the company threatens to quit China.
January 13, 2010
Delivering Security on Demand
Companies are increasingly offering security products as services, but is it the best approach?
July 20, 2009
Privacy Requires Security, Not Abstinence
Protecting an inalienable right in the age of Facebook.
June 23, 2009