Americans paid about $325 million in cyber ransom in 2015, and that figure will rise dramatically this year.
The Computer Fraud and Abuse Act (CFAA) has been used in some of the biggest computer cases of the last decade.
President Obama has asked Congress to spend $19 billion on cyber security in the fiscal 2017 budge proposal.
Argaman will have to deal with threats including ISIS, stabbing attacks and cyber warfare.
Security experts warn Internet Explorer users are vulnerable to viruses as Microsoft issues "End of Life" notice for old versions of the browser.
Ghost Caliphate Hackers supportive of ISIS have teamed up with the Pro-Palestine hacking group AnonGhost.
The anti-ISIS New World Hackers group performed a cyber attack live on-air.
Eric Schmidt wants to see more done to tackle hate speech.
The attack may have compromised potentially sensitive national security information at Australia's Bureau of Meteorology
A congressional advisory body says retaliating would make hacks more costly to perpetrators.
British Chancellor George Osborne has said security services will develop cyber attack powers to prevent terror plots and combat recruitment.
The extremist group offer instructions to its members on how to avoid cyber attacks.
The good news is that many of these are free.
The controversial Cybersecurity Information Sharing Act passed in the Senate Tuesday afternoon.
There many ways that your ID can be misused by a skilled ID thief.
Nine people were indicted on charges of an insider trading scheme.
An interactive map by Norse, a threat intelligence firm, visualizes the global cyberwar in real time.
Hacking Team reportedly has contracts with U.S. law enforcement as well.
Experts warn that a cyber attack on the national grid or water infrastructure could have "catastrophic" effects.
Participants volunteer personal biological information for researchers and scientists.
Users complain they were not made aware of the the software that could be capable of collecting sensitive data.
With little congressional involvement, the Justice Department is changing the rules about how law enforcement obtains warrants.
A Moscow-based security software maker has exposed a series of Western cyber espionage operations.