Tackling counterfeit seeds with “unclonable” labels
Fake seeds can cost farmers more than two-thirds of expected crop yields and threaten food security. Trackable silk labels could help.
Fake seeds can cost farmers more than two-thirds of expected crop yields and threaten food security. Trackable silk labels could help.
In MIT’s 2023 Killian Lecture, Peter Shor shares a brief history of quantum computing from a personal viewpoint.
Cloud security and video forensics software have been transitioned to end users.
New research enables users to search for information without revealing their queries, based on a method that is 30 times faster than comparable prior techniques.
In the fight against escalating cybercrime, boards need to deepen their cybersecurity competencies, explains Keri Pearlson, executive director of Cybersecurity at MIT Sloan.
Hackathon explores policy solutions to challenges in cybersecurity, environmental justice, and city planning focused on post-pandemic efforts to build a better society.
James Rice discusses supply chain resilience and how organizations can prepare for the next big problem.
MIT alumnus-founded Metrika has developed a suite of analytics tools giving blockchain communities visibility into their networks.
MIT professor to share $3 million prize with three others; Daniel Spielman PhD ’95 wins Breakthrough Prize in Mathematics.
Technologies recognized with "Oscars of Innovation" transform hurricane tracking, electronics cooling, collision avoidance, cybersecurity, and more.
Researchers increase the accuracy and efficiency of a machine-learning method that safeguards user data.
Mary Ellen Zurko pioneered user-centered security in the 1990s. Now she’s using those insights to help the nation thwart influence operations.
Researchers found that an understudied component of computer processors is susceptible to attacks from malicious agents. Then, they developed mitigation mechanisms.
Researchers demonstrate two security methods that efficiently protect analog-to-digital converters from powerful attacks that aim to steal user data.
CSAIL scientists’ novel hardware attack against the Apple M1 chip defeats the last line of security while leaving no trace.