Hackers, Welcome back! Here we are again with the fourth round of the Cybersecurity Writing Contest result announcement by Twingate & HackerNoon!
How do we enter the contest? Easy-peasy. Simply share any story on
The Cybersecurity Writing Contest September 2022 Nominations
We picked all the stories tagged with the #cybersecurity tag on HackerNoon, published in July 2022. As usual, we chose the top stories using 60:30:10 weightage respectively to:
- Number of hours read
- The number of people reached
- The freshness of the content
Here are the top 10 nominations for the fourth round:
- How an 18-Year-Old Teen Breached Uber Without Hacking a Single System by @antagonist.
- The Infamous Hacker Bjorka's Top 7 Leaks that Shocked the Public by @dailyabay.
- Violent Attack Vectors in Web3: A Detailed Review by @officercia.
- How to Create a Random Password Generator Using Python by @terieyenike.
- 5 Ways to Protect Yourself From Getting Scammed in the Crypto World by @dimenkodima.
- “Hackers for Hire” Is a Rising Industry That Demands Ethical Considerations by @craiglebrau.
- What is ARP Spoofing and How to Protect Against It? by @officercia.
- The Massive Uber Hack: Technical and Legal Implications by @aswagaawy.
- A Former Hacker’s 10 Tips on Staying Safe Online by @propublica.
- How to Encrypt a PDF Using Python by @terieyenike.
Winners!
The editors then voted for the top stories. Here are the winners for the month of September 2022:
The FIRST place goes to How an 18-Year-Old Teen Breached Uber Without Hacking a Single System by @antagonist.
“The user went all in. Very timely and insightful story in the wake of the massive Uber leak (and a reminder to take your organization's phishing seminars seriously).” - HackerNoon Editor
Great job @antagonist !! You have won 500 USD!
In the SECOND place, as well as the winner of the Most Read Story, we have The Infamous Hacker Bjorka's Top 7 Leaks that Shocked the Public by @dailyabay.
“A listicle...but done the right way!” - HackerNoon Editor
21,000+ reads! Damn. Congratulations @dailyabay, you have won 300+100=400 USD!
Last but not least, the THIRD place goes to What is ARP Spoofing and How to Protect Against It? by @officercia.
“Spoof” sounds like a sound effect for an airbag going off in a car or something. Sure, “spoofing” sounds like a funny word but when it comes to security it is anything but. It is the intentional act of camouflaging malicious actors and intent under the guise of legitimate behavior.”
Great story @officercia. You have won 100 USD!!
Congratulations again to all the winners, and best of luck to the nominees and future participants of the Cybersecurity Writing Contest. Let’s wrap up the announcement! We will contact the winners shortly. Keep an eye on contests.hackernoon.com to see the current and upcoming writing contests!