• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Cloud

New Types Of Cyber Attacks You May Face In 2020

Paul Balo by Paul Balo
January 16, 2020
in Cloud, Reviews, Security
Share on FacebookShare on Twitter

Cybersecurity threats were a huge problem last year.

As a matter of fact, Forbes reported that just in the first 6 months of 2019 there were 3,800 publicly disclosed breaches— a whopping 52 percent surge from the first 6 months of 2018. In addition, data breaches in 2019 have affected every sector, from healthcare and financials to entertainment and even the government.

Thus, it is expected that cyber threats will persist to be a problem this year. In addition to the existing cyber-attacks, here are some new types of security threats that you may face this 2020.

  1. Gone SMiShing

Phishing is old school.

And with the arrival of a new decade, cybercriminals are more likely to use “smishing” as their latest identity theft trick.

Image Source 

Cybercriminals activate their smishing strategies via sensing faulty SMS to unsuspecting consumers and also requesting sensitive data like bank account information or credit card, which may result in identity theft.

Poor grammar and misspelled words are just some of the tell-tale signs that a text may not be what it seems. However, with the increasingly sophisticated attacks, you shouldn’t rely on this. The safest bet is to avoid responding to text messages or clicking links from an unknown sender and deleting them right away!

  1. The Price of Mobile Payments

It is no doubt that the mobile payments sector is booming without any signs of slowing down, thanks to the relatively low cost for retailers and the convenience it gives to consumers.

However as mobile POS platforms like those used at sporting events or concerts become more popular, hackers can use this new payment method to extract sensitive information and tamper with transactions.

  1. Trouble In The Cloud

Most organizations have migrated their information and data to the cloud last year, with the hope that this could help lessen eh risk of cyber threats.

Image source

Simply moving the data to the cloud, however, doesn’t guarantee that your data are actually safer. After all, the Capital One breach which is one of the largest breaches in 2019, happened when a hacker infiltrated the servers of a 3rd party Cloud computing company that the organization used and resulted in approximately 106 million records exposed.

In addition, Cloud Jacking is predicted to be one of the most prominent cybercrime this 2020 because of the increased use of cloud computing. The Cloud security’s infrastructure is going to have surged in complexity as attacks on Cloud services also become more complicated.

  1. Hackers From The Skies

When thinking of hackers, you probably imagine someone sitting in front of a computer screen in order to steal sensitive data.

While it is still true today, this 2020, hackers have become more sophisticated and can use a much different method. They tend to focus more on public Wi-Fi networks that most cities have implemented via the skies.

Now, cybercriminals can equip drone devices with a hand-held hacking device (Pineapple technology) to scour the skies for any consumer data on such public Wi-Fi networks. And with over 1 million drone devices that operate the U.S. skies, hackers have a whole new airway for stealing data.

  1. Deepfake Is The New Buzzword

The term “deepfake” was coined a few years ago. This 2020 though, it will become the buzzword.

This technology allows cybercriminals to spread misinformation digitally via the auto-generation of fake audio recording and videos, as well as swapping the faces of politicians and celebrities into what can be potentially viral content on social media.

Image Source

This now readily available technology uses new forms of “stalkerware”, a kind of spyware that tracks the victim’s phone data in order to build up a picture of their activities and used in creating fake videos, written communications or voice recordings.

It is expected to cause a large-scale disruption across financial markets, politics, and industries as people struggle to distinguish the real from the fake.

Related Posts:

  • cyber-security-istock
    African SMEs Face a Host of Cybersecurity Challenges
  • Copy-of-Blue-Modern-Gradient-Beauty-And-Fashion-Blog-Banner-2024-07-10T161619.685
    Kenya Reports 2.54 Billion Cyber Threats in Q1 of 2025
  • router-595x335_0
    US And UK Warn Of Custom Malware Vulnerability On…
  • Colosseum,In,Rome,,Italy.,Ancient,Roman,Colosseum,Is,One,Of
    Accenture Buys Cybersecurity Firm CyberCX for Over…
  • Robotics
    Nigeria Ranked As Africa’s Second Most Cyber-secure…
  • bxk6r5Uk-Obi-4
    The Problem With The Leaked Phone Call Between Peter…
  • Top_Cybersecurity_Projects
    Cybersecurity Projects for Both beginners and Experts
  • REv-CC-FutureProofIT-AdressingInsiderThreats-02@2x
    The Silent Enemy: How Insider Threats Are Stealing…

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: cloud securitydeep fakefree wifihackersmobile paymentsecuritywifi
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Cursor Introduces An AI Coding Tool For Designers December 12, 2025
  • OpenAI Unveils More Advanced Model as Google Rivalry Grows December 12, 2025
  • WhatsApp Is Redefining The Voicemail Features For Users December 12, 2025
  • Microsoft’s Nadella Is Building a Cricket App in His Spare Time December 12, 2025
  • Google Photos Expands ‘Remix’ Feature to More Countries December 12, 2025
  • Google Play Store Reinstates Fortnite December 12, 2025
  • Vodacom Announces Price Hike December 12, 2025
  • ChatGPT Set to Launch ‘Adult Mode’ By Q1 2026 December 12, 2025
  • Amazon to Invest $35B in India by 2030 for Jobs & AI Growth December 11, 2025
  • SpaceX May Launch Its Big IPO Next Year With a $1tr Valuation December 11, 2025
  • GPT-5.2 Debuts as OpenAI Answers “Code Red” Challenge December 11, 2025
  • Netflix Plans Heavy Borrowing to Fund Warner Bros Deal December 11, 2025

Browse Archives

December 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
293031 
« Nov    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.