• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Cloud

New Types Of Cyber Attacks You May Face In 2020

Paul Balo by Paul Balo
January 16, 2020
in Cloud, Reviews, Security
Share on FacebookShare on Twitter

Cybersecurity threats were a huge problem last year.

As a matter of fact, Forbes reported that just in the first 6 months of 2019 there were 3,800 publicly disclosed breaches— a whopping 52 percent surge from the first 6 months of 2018. In addition, data breaches in 2019 have affected every sector, from healthcare and financials to entertainment and even the government.

Thus, it is expected that cyber threats will persist to be a problem this year. In addition to the existing cyber-attacks, here are some new types of security threats that you may face this 2020.

  1. Gone SMiShing

Phishing is old school.

And with the arrival of a new decade, cybercriminals are more likely to use “smishing” as their latest identity theft trick.

Image Source 

Cybercriminals activate their smishing strategies via sensing faulty SMS to unsuspecting consumers and also requesting sensitive data like bank account information or credit card, which may result in identity theft.

Poor grammar and misspelled words are just some of the tell-tale signs that a text may not be what it seems. However, with the increasingly sophisticated attacks, you shouldn’t rely on this. The safest bet is to avoid responding to text messages or clicking links from an unknown sender and deleting them right away!

  1. The Price of Mobile Payments

It is no doubt that the mobile payments sector is booming without any signs of slowing down, thanks to the relatively low cost for retailers and the convenience it gives to consumers.

However as mobile POS platforms like those used at sporting events or concerts become more popular, hackers can use this new payment method to extract sensitive information and tamper with transactions.

  1. Trouble In The Cloud

Most organizations have migrated their information and data to the cloud last year, with the hope that this could help lessen eh risk of cyber threats.

Image source

Simply moving the data to the cloud, however, doesn’t guarantee that your data are actually safer. After all, the Capital One breach which is one of the largest breaches in 2019, happened when a hacker infiltrated the servers of a 3rd party Cloud computing company that the organization used and resulted in approximately 106 million records exposed.

In addition, Cloud Jacking is predicted to be one of the most prominent cybercrime this 2020 because of the increased use of cloud computing. The Cloud security’s infrastructure is going to have surged in complexity as attacks on Cloud services also become more complicated.

  1. Hackers From The Skies

When thinking of hackers, you probably imagine someone sitting in front of a computer screen in order to steal sensitive data.

While it is still true today, this 2020, hackers have become more sophisticated and can use a much different method. They tend to focus more on public Wi-Fi networks that most cities have implemented via the skies.

Now, cybercriminals can equip drone devices with a hand-held hacking device (Pineapple technology) to scour the skies for any consumer data on such public Wi-Fi networks. And with over 1 million drone devices that operate the U.S. skies, hackers have a whole new airway for stealing data.

  1. Deepfake Is The New Buzzword

The term “deepfake” was coined a few years ago. This 2020 though, it will become the buzzword.

This technology allows cybercriminals to spread misinformation digitally via the auto-generation of fake audio recording and videos, as well as swapping the faces of politicians and celebrities into what can be potentially viral content on social media.

Image Source

This now readily available technology uses new forms of “stalkerware”, a kind of spyware that tracks the victim’s phone data in order to build up a picture of their activities and used in creating fake videos, written communications or voice recordings.

It is expected to cause a large-scale disruption across financial markets, politics, and industries as people struggle to distinguish the real from the fake.

Related Posts:

  • cyber-security-istock
    African SMEs Face a Host of Cybersecurity Challenges
  • Copy-of-Blue-Modern-Gradient-Beauty-And-Fashion-Blog-Banner-2024-07-10T161619.685
    Kenya Reports 2.54 Billion Cyber Threats in Q1 of 2025
  • router-595x335_0
    US And UK Warn Of Custom Malware Vulnerability On…
  • Colosseum,In,Rome,,Italy.,Ancient,Roman,Colosseum,Is,One,Of
    Accenture Buys Cybersecurity Firm CyberCX for Over…
  • Robotics
    Nigeria Ranked As Africa’s Second Most Cyber-secure…
  • openai
    OpenAI Rolls Out GPT-5.4-Cyber with Trusted Access…
  • Top_Cybersecurity_Projects
    Cybersecurity Projects for Both beginners and Experts
  • handala hackers
    FBI Warns of Handala Hackers Using Telegram for Malware

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: cloud securitydeep fakefree wifihackersmobile paymentsecuritywifi
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Tulupay Unveils Prelaunch of Pan-African Financial OS to Bridge Web2 and Web3 Rails April 17, 2026
  • Short-Form Video App, SaySo, To Rebuild Trust April 17, 2026
  • OpenAI Enhances Codex With Computer Control & Image Generation April 17, 2026
  • Bluesky Reviews The Outage Cause To Be A DDoS Attack April 17, 2026
  • OpenAI Unveils GPT-Rosalind, Aiming at Drug Discovery and Genomics April 17, 2026
  • Google Chrome’s AI Mode Now Handles Tabs More Like a Human Assistant April 17, 2026
  • Anthropic Launches Claude Opus 4.7 as Safer Alternative to Mythos AI April 16, 2026
  • Bluesky Seemed To Be Down For Some Time Today April 16, 2026
  • Lagos Commissioner Gives 21-Weeks Delivery Time Frame On Obalende MTN Yello Park Project April 16, 2026
  • Google Brings a Native Gemini App to macOS, With Deep Screen Access April 16, 2026
  • CAC Experiences Data Breach, Users Advised To Reset Login Credentials April 16, 2026
  • Opera adds Browser Connector for integrating AI chatbots April 16, 2026

Browse Archives

April 2026
MTWTFSS
 12345
6789101112
13141516171819
20212223242526
27282930 
« Mar    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

Chat with TechBooky AI
💬
TechBooky AI ✕
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.