The Who and How of Cyber Criminals

Cyber crime

Though the "script kiddies" ─ juvenile hackers creating disruptions for their own amusement ─ of the early 2000s still exist, the source of cyber threats has grown more menacing. There are politically- and ideologically-motivated hacktivists, who work alone and in concert as part of groups like Anonymous. There are members of organized crime syndicates. There are rival companies and, scariest of all, foreign governments, who operate with virtually unlimited resources and no fear of prosecution.

Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.

To access these options, along with all other subscription benefits, please contact info@waterstechnology.com or view our subscription options here: http://subscriptions.waterstechnology.com/subscribe

You are currently unable to copy this content. Please contact info@waterstechnology.com to find out more.

Sorry, our subscription options are not loading right now

Please try again later. Get in touch with our customer services team if this issue persists.

New to Waterstechnology? View our subscription options

Systematic tools gain favor in fixed income

Automation is enabling systematic strategies in fixed income that were previously reserved for equities trading. The tech gap between the two may be closing, but differences remain.

You need to sign in to use this feature. If you don’t have a WatersTechnology account, please register for a trial.

Sign in
You are currently on corporate access.

To use this feature you will need an individual account. If you have one already please sign in.

Sign in.

Alternatively you can request an individual account here