• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Cloud

New Types Of Cyber Attacks You May Face In 2020

Paul Balo by Paul Balo
January 16, 2020
in Cloud, Reviews, Security
Share on FacebookShare on Twitter

Cybersecurity threats were a huge problem last year.

As a matter of fact, Forbes reported that just in the first 6 months of 2019 there were 3,800 publicly disclosed breaches— a whopping 52 percent surge from the first 6 months of 2018. In addition, data breaches in 2019 have affected every sector, from healthcare and financials to entertainment and even the government.

Thus, it is expected that cyber threats will persist to be a problem this year. In addition to the existing cyber-attacks, here are some new types of security threats that you may face this 2020.

  1. Gone SMiShing

Phishing is old school.

And with the arrival of a new decade, cybercriminals are more likely to use “smishing” as their latest identity theft trick.

Image Source 

Cybercriminals activate their smishing strategies via sensing faulty SMS to unsuspecting consumers and also requesting sensitive data like bank account information or credit card, which may result in identity theft.

Poor grammar and misspelled words are just some of the tell-tale signs that a text may not be what it seems. However, with the increasingly sophisticated attacks, you shouldn’t rely on this. The safest bet is to avoid responding to text messages or clicking links from an unknown sender and deleting them right away!

  1. The Price of Mobile Payments

It is no doubt that the mobile payments sector is booming without any signs of slowing down, thanks to the relatively low cost for retailers and the convenience it gives to consumers.

However as mobile POS platforms like those used at sporting events or concerts become more popular, hackers can use this new payment method to extract sensitive information and tamper with transactions.

  1. Trouble In The Cloud

Most organizations have migrated their information and data to the cloud last year, with the hope that this could help lessen eh risk of cyber threats.

Image source

Simply moving the data to the cloud, however, doesn’t guarantee that your data are actually safer. After all, the Capital One breach which is one of the largest breaches in 2019, happened when a hacker infiltrated the servers of a 3rd party Cloud computing company that the organization used and resulted in approximately 106 million records exposed.

In addition, Cloud Jacking is predicted to be one of the most prominent cybercrime this 2020 because of the increased use of cloud computing. The Cloud security’s infrastructure is going to have surged in complexity as attacks on Cloud services also become more complicated.

  1. Hackers From The Skies

When thinking of hackers, you probably imagine someone sitting in front of a computer screen in order to steal sensitive data.

While it is still true today, this 2020, hackers have become more sophisticated and can use a much different method. They tend to focus more on public Wi-Fi networks that most cities have implemented via the skies.

Now, cybercriminals can equip drone devices with a hand-held hacking device (Pineapple technology) to scour the skies for any consumer data on such public Wi-Fi networks. And with over 1 million drone devices that operate the U.S. skies, hackers have a whole new airway for stealing data.

  1. Deepfake Is The New Buzzword

The term “deepfake” was coined a few years ago. This 2020 though, it will become the buzzword.

This technology allows cybercriminals to spread misinformation digitally via the auto-generation of fake audio recording and videos, as well as swapping the faces of politicians and celebrities into what can be potentially viral content on social media.

Image Source

This now readily available technology uses new forms of “stalkerware”, a kind of spyware that tracks the victim’s phone data in order to build up a picture of their activities and used in creating fake videos, written communications or voice recordings.

It is expected to cause a large-scale disruption across financial markets, politics, and industries as people struggle to distinguish the real from the fake.

Related Posts:

  • cyber-security-istock
    African SMEs Face a Host of Cybersecurity Challenges
  • Copy-of-Blue-Modern-Gradient-Beauty-And-Fashion-Blog-Banner-2024-07-10T161619.685
    Kenya Reports 2.54 Billion Cyber Threats in Q1 of 2025
  • router-595x335_0
    US And UK Warn Of Custom Malware Vulnerability On…
  • Colosseum,In,Rome,,Italy.,Ancient,Roman,Colosseum,Is,One,Of
    Accenture Buys Cybersecurity Firm CyberCX for Over…
  • Robotics
    Nigeria Ranked As Africa’s Second Most Cyber-secure…
  • bxk6r5Uk-Obi-4
    The Problem With The Leaked Phone Call Between Peter…
  • Top_Cybersecurity_Projects
    Cybersecurity Projects for Both beginners and Experts
  • REv-CC-FutureProofIT-AdressingInsiderThreats-02@2x
    The Silent Enemy: How Insider Threats Are Stealing…

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: cloud securitydeep fakefree wifihackersmobile paymentsecuritywifi
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Copilot Adds Audio Generation with Expressive Voices September 13, 2025
  • Nigerian Government Removes 5% Tax on Call & Data Service September 12, 2025
  • Amid Violent Anti-Corruption Protests, Nepalis Turn to Jack Dorsey’s Bitchat September 12, 2025
  • Bain Sells Data Centres for $4 Billion to HEC-Led Group September 12, 2025
  • AirPods Pro 3 Can Track Your Heart and Translate Live September 10, 2025
  • Apple Watch Ultra 3 Brings 42-Hour Battery and New Health Alerts September 10, 2025

Browse Archives

September 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
2930 
« Aug    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.