Governments continue losing efforts to gain backdoor access to secure communications

The perennial tug-of-war between government interests and individual liberties is playing out in the battle over encrypted messaging. Technology tilts the field toward individuals.

Richard Forno, Teaching Professor of Computer Science and Electrical Engineering, and Assistant Director, UMBC Cybersecurity Institute, University of Maryland, Baltimore County • conversation
May 16, 2025 ~10 min

M&S cyberattacks used a little-known but dangerous technique – and anyone could be vulnerable

Sim-swap fraud is becoming increasingly prevalent.

Hossein Abroshan, Senior Lecturer, School of Computing and Information Science, Anglia Ruskin University • conversation
May 14, 2025 ~6 min


Challenges to high-performance computing threaten US innovation

Today’s supercomputers are enormously powerful, but the work they do − running AI and tackling difficult science − is pushing them to their limits. Building bigger supercomputers won’t be easy.

Jack Dongarra, Emeritus Professor of Computer Science, University of Tennessee • conversation
May 14, 2025 ~10 min

M&S cyberattacks used a little-known but dangerous technique

Sim-swap fraud is becoming increasingly prevalent.

Paul Rincon, Commissioning Editor, Science, Technology and Business • conversation
May 14, 2025 ~6 min

AI can scan vast numbers of social media posts during disasters to guide first responders

Natural disasters prompt a flood of social media posts. AI can help sift the wheat of helpful information from the chaff of chitchat and misinformation.

Ademola Adesokan, Postdoctoral Researcher in Computer Science, Missouri University of Science and Technology • conversation
May 13, 2025 ~6 min

How the Take It Down Act tackles nonconsensual deepfake porn − and how it falls short

A bill with broad bipartisan support aims to take on AI-generated sexual abuse, but enforcement issues and privacy blind spots could leave victims just as vulnerable.

Sylvia Lu, Faculty Fellow and Visiting Assistant Professor of Law, University of Michigan • conversation
May 8, 2025 ~10 min

How the US can mine its own critical minerals − without digging new holes

Rare earth elements are tiny yet essential parts of many of the technologies you use every day. New techniques are making their recovery from US sources increasingly viable.

Scott McWhorter, Distinguished Fellow in the Strategic Energy Institute, Georgia Institute of Technology • conversation
May 6, 2025 ~9 min

Predictive policing AI is on the rise − making it accountable to the public could curb its harmful effects

AI that anticipates where crimes are likely to occur and who might commit them has a troubling track record. Democratic accountability could shine a light on the technology and how it’s used.

Maria Lungu, Postdoctoral Researcher of Law and Public Administration, University of Virginia • conversation
May 6, 2025 ~8 min


How millions of people can watch the same video at the same time – a computer scientist explains the technology behind streaming

A lot of sophisticated digital plumbing goes into delivering that streaming video to your phone, computer or TV.

Chetan Jaiswal, Associate Professor of Computer Science, Quinnipiac University • conversation
May 2, 2025 ~8 min

Forensics tool ‘reanimates’ the ‘brains’ of AIs that fail in order to understand what went wrong

AIs are notoriously opaque, even to the people who build them, which makes it hard to know why they fail. A new tool aims to reveal their inner workings at the moment they went off the rails.

Brendan Saltaformaggio, Associate Professor of Cybersecurity and Privacy, and Electrical and Computer Engineering, Georgia Institute of Technology • conversation
April 30, 2025 ~7 min

/

61