Advocates say tools that cloak online identities are needed to protect activists. Prosecutors say they hinder efforts to police all kinds of crime, from child pornography to illegal gun sales.
This week in tech, private security experts continued to question the FBI's claim that North Korea was behind the cyberattack on Sony Pictures. Also, a new app connects people and their stuff.
The software used in the Sony data breach is available on the underground market. This makes it easier for criminals to execute an attack but harder to identify the perpetrators.
The cyberattack successfully achieved its unusually public goals. The question, reporter David Sanger says, is how the United States can punish what already is the world's most-sanctioned nation.
High-tech firms have been offering bounties to security researchers to find holes and bugs in their software, but these reward programs haven't drawn much interest from major banks.
The Internet can reside in almost anything inside your home, which heightens opportunities for hacking your personal privacy. Cybersecurity firms face the tall task of keeping you protected.
When you hear the word outsourcing, you might think of threats to jobs. To cyber experts, there's another threat: to our data. Hiring third parties with lax security can leave data vulnerable.