MIT Energy Initiative awards nine seed fund grants for early-stage energy research
Winning teams will use grants to advance research in areas including fuel cells, solar-powered desalination, and impacts of electric vehicle charging on the power grid.
System predicts 85 percent of cyber-attacks using input from human experts
Virtual artificial intelligence analyst developed by the Computer Science and Artificial Intelligence Lab and PatternEx reduces false positives by factor of 5.
Two MIT faculty win 2016 NSF CAREER Awards
James Swan and Konstantin Turitsyn are among 160 young scientists and engineers poised to explore new frontiers and inspire a future generation of scholars.
U.S., EU leaders talk Web policy and world economy at MIT
With EU vice president, U.S. secretary of commerce discusses EU-U.S. “Privacy Shield” and launches new policy program.
MIT, Cambridge University team up for “Cambridge 2 Cambridge” hackathon
Hosted by the Computer Science and Artificial Intelligence Laboratory, event featured mixed student teams tackling cybersecurity challenges.
Toward hack-proof RFID chips
New technology could secure credit cards, key cards, and pallets of goods in warehouses.
Pushing engineering boundaries to spur infrastructure innovation
MIT hosts Infrastructure Innovation in a Changing Environment Conference.
Data, drones, and 3-D-printed hearts
Looking back on the year that was: Highlights from the Computer Science and Artificial Intelligence Lab in 2015.
What are your apps hiding?
Half of the communication connections established by the top 500 Android apps have no effect on user experience.
Expecting the unexpected
In new book, MIT professor explains how companies can lessen the shocks of a volatile world.
Tips for securing your data at MIT
The Information Protection @ MIT website provides access to policies, resources, and guides for safeguarding sensitive data at the Institute.
High-school students decipher cryptography
At MIT Lincoln Laboratory's LLCipher workshop, students practice critical thinking and learn some cybersecurity basics.
Shoring up Tor
Researchers mount successful attacks against popular anonymity network — and show how to prevent them.
CSAIL report: Giving government special access to data poses major security risks
Whether “backdoor” or “front-door,” government access imperils your data, report authors say.