All Tech Considered All Tech Considered Tech, Culture and Connection

Support NPR

Support NPR

NPR Shop

Support The Programs You Love

© NPR

Michael Calce, who went by the online name Mafiaboy when he launched a massive cyberattack at the age of 15, now works as a security consultant for companies trying to protect their online systems. Vincenzo D'Alto/Courtesy of Michael Calce hide caption

itoggle caption Vincenzo D'Alto/Courtesy of Michael Calce

Anthem says 80 million company records were accessed in what may be one of the largest health care data breaches to date. Aaron P. Bernstein/Getty Images hide caption

itoggle caption Aaron P. Bernstein/Getty Images

President Obama speaks Tuesday at the National Cybersecurity and Communications Integration Center in Arlington, Va. Pool/Getty Images hide caption

itoggle caption Pool/Getty Images

The president spoke about one measure aimed at the data collected in schools, through increasingly popular educational software. "Michelle and I are like parents everywhere," Obama said. "We want to be sure our children are being smart and safe online." Carolyn Kaster/AP hide caption

itoggle caption Carolyn Kaster/AP

Whirlpool's Kitchen of the Future is on display at the International Consumer Electronics Show in Las Vegas. The concept includes a cooktop and connected backsplash that offers recipes and other information. Whirlpool hide caption

itoggle caption Whirlpool

A screen shot taken from a video demonstrating how Iowa's digital driver's license would look on a smartphone. Iowa Department of Transportation hide caption

itoggle caption Iowa Department of Transportation

To protect against fraud, U.S. banks will be issuing credit cards with small computer chips. But some experts say using a PIN to complete a transaction is more secure than a signature. iStockphoto hide caption

itoggle caption iStockphoto

Using Tor, or The Onion Router, enables users to hide their online activities. Advocates say the network protects the privacy of activists. But prosecutors say it's used extensively by criminals — and is making it harder for law enforcement to do its job. Daniel Acker/Bloomberg via Getty Images hide caption

itoggle caption Daniel Acker/Bloomberg via Getty Images

The toxic ingredients of a cyberattack like the one North Korea is accused of unleashing on Sony Pictures are available in underground markets. Damian Dovarganes/AP hide caption

itoggle caption Damian Dovarganes/AP

Sony Pictures CEO Michael Lynton says the computer hacking against his company is "the worst cyberattack in U.S. history." Experts say other attacks have affected more people. David McNew/Reuters/Landov hide caption

itoggle caption David McNew/Reuters/Landov

Sony Pictures was forced to cancel the release of its film The Interview this week after the hacking group, Guardians of Peace, threatened theaters that planned to screen the movie. AFP/Getty Images hide caption

itoggle caption AFP/Getty Images

The four undergrads of the Diaspora team were given "a global commission to rebottle the genie of personal privacy" after scoring $200,000 in a Kickstarter campaign and support and mentorship from Silicon Valley's brightest. Henrik Moltke/Flickr hide caption

itoggle caption Henrik Moltke/Flickr

James Franco (left) and Seth Rogen in The Interview. The North Korean dictator promised "merciless counter-measures" if this film was released. Ed Araquel/AP hide caption

itoggle caption Ed Araquel/AP

The Amazon Echo is Bluetooth-enabled and can play music from Amazon Prime Music or other music services. And it's ready to listen to your questions and commands. Amazon.com/AP hide caption

itoggle caption Amazon.com/AP

Participants in an ethical hacking contest at a Swiss security conference in Geneva in March. So-called bug bounty programs are becoming very popular in Silicon Valley's high-tech sector. Salvatore Di Nolfi/EPA/Landov hide caption

itoggle caption Salvatore Di Nolfi/EPA/Landov