All Tech Considered All Tech Considered Tech, Culture and Connection

A screen shot taken from a video demonstrating how Iowa's digital driver's license would look on a smartphone. Iowa Department of Transportation hide caption

itoggle caption Iowa Department of Transportation

To protect against fraud, U.S. banks will be issuing credit cards with small computer chips. But some experts say using a PIN to complete a transaction is more secure than a signature. iStockphoto hide caption

itoggle caption iStockphoto

Using Tor, or The Onion Router, enables users to hide their online activities. Advocates say the network protects the privacy of activists. But prosecutors say it's used extensively by criminals — and is making it harder for law enforcement to do its job. Daniel Acker/Bloomberg via Getty Images hide caption

itoggle caption Daniel Acker/Bloomberg via Getty Images

Support NPR

Support NPR

NPR Shop

Support The Programs You Love

© NPR

The toxic ingredients of a cyberattack like the one North Korea is accused of unleashing on Sony Pictures are available in underground markets. Damian Dovarganes/AP hide caption

itoggle caption Damian Dovarganes/AP

Sony Pictures CEO Michael Lynton says the computer hacking against his company is "the worst cyberattack in U.S. history." Experts say other attacks have affected more people. David McNew/Reuters/Landov hide caption

itoggle caption David McNew/Reuters/Landov

Sony Pictures was forced to cancel the release of its film The Interview this week after the hacking group, Guardians of Peace, threatened theaters that planned to screen the movie. AFP/Getty Images hide caption

itoggle caption AFP/Getty Images

The four undergrads of the Diaspora team were given "a global commission to rebottle the genie of personal privacy" after scoring $200,000 in a Kickstarter campaign and support and mentorship from Silicon Valley's brightest. Henrik Moltke/Flickr hide caption

itoggle caption Henrik Moltke/Flickr

James Franco (left) and Seth Rogen in The Interview. The North Korean dictator promised "merciless counter-measures" if this film was released. Ed Araquel/AP hide caption

itoggle caption Ed Araquel/AP

The Amazon Echo is Bluetooth-enabled and can play music from Amazon Prime Music or other music services. And it's ready to listen to your questions and commands. Amazon.com/AP hide caption

itoggle caption Amazon.com/AP

Participants in an ethical hacking contest at a Swiss security conference in Geneva in March. So-called bug bounty programs are becoming very popular in Silicon Valley's high-tech sector. Salvatore Di Nolfi/EPA/Landov hide caption

itoggle caption Salvatore Di Nolfi/EPA/Landov

A customer sets up her new iPhone 6 at an Apple store in Beijing on Friday. A group says the Chinese government backed an attack against users of Apple's iCloud service, but the government denies the claim. Feng Li/Getty Images hide caption

itoggle caption Feng Li/Getty Images

Twitter is suing the federal government over First Amendment rights. The tech company says the government stopped it from releasing extra detail about government requests for user information. iStockphoto hide caption

itoggle caption iStockphoto