We took a look at the world of malicious hackers to see if the five main archetypes we previously identified remain the same in 2014,
or if the world of illicit hackers has changed (and how) over the past few years.
We found an evolution of hackers with similar designs, as well as new and sophisticated tools.
Present-day hackers fall into the following current categories.