paint-brush
58 Stories To Learn About Cybersecurity Writing Contestby@learn
131 reads

58 Stories To Learn About Cybersecurity Writing Contest

by Learn RepoNovember 8th, 2023
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Learn everything you need to know about Cybersecurity Writing Contest via these 58 free HackerNoon stories.

People Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - 58 Stories To Learn About Cybersecurity Writing Contest
Learn Repo HackerNoon profile picture

Let's learn about Cybersecurity Writing Contest via these 58 free stories. They are ordered by most time reading created on HackerNoon. Visit the /Learn Repo to find the most read stories about any technology.

1. The Cybersecurity Writing Contest 2022: Round 2 Results Announced!

Hackers, the Round 2 Results for the Cybersecurity Writing Contest by Twingate and HackerNoon are here!

2. Common Vulnerabilities and Exposures: A Poem

There's still some cases of malware always-alarmed-and-on, always large-in-scale in sight and run via spray pray on-site.

3. Ransomware: Early Signs, Protection, and Staying Ahead

In this article, you will learn about the signs of ransomware and how you can identify them.

4. Why I'm Fascinated by Cybersecurity: Interview with Jaspreet Kaur

A women-in-tech interview with Jaspreet Kaur; a researcher, faculty, blogger, and consultant in the field of cyber security.

5. The Cybersecurity Writing Contest 2022: Round 3 Results Announced!

Hackers, Assemble! Here we are with the third round’s results announcement of the Cybersecurity Writing Contest by Twingate & HackerNoon!

6. Myths and Misconceptions About Private Browsing

Many people who use private browsing incorrectly believe they're protected. Private Browsing doesn't make you anonymous.

7. 'Outlaw Hacking Group' Resurfaces

A digital forensics by CYE's Critical Cyber Operations group found that the the "Outlaw Hacking Group" may be back.

8. Biting Back Against Phishers

How one company learned to deal with Phishing attempts that tried to compromise their cybersecurity system and how they learned to fight back against them.

9. What will IBM's Acquisition of Randori Mean for Cybersecurity?

IBM announced plans to acquire a leading attack surface management provider and offensive security company Randori.

10. What I Learned from Teaching a Cybersecurity Class After Passing CompTIA Security+

This is a reflection of what I learned from teaching a cybersecurity class for beginners after I had passed CompTIA Security+

11. Quick Guide to the Open Source Security Summit

The Open Source Security Foundation met for Linux Foundation’s North American Summit, here are highlights to help every developer keep Open Source secure.

12. Top 7 Access Control System Manufacturers

Here is a list of the top 7 access control system providers that offer feature-rich security systems for your business/organization.

13. Harmony's Horizon Bridge Attack: How $100M was Siphoned Off By a Hacker

The attack was successful because two validators' private keys were suspected to be compromised.

14. Cyber Deterrence is More Important than Nuclear Deterrence

Sleep Tight - It Ain’t Gonna Be A Nuclear Fight!

15. Why Bitcoin is Not an "Ideal" Ransomware Currency

Bitcoin ain't a ticket to “cyber gangsta’s paradise.”

16. Protect Your Digital Identity— Level One (Mobile)

In part one of this guide to protect your digital ID, I will talk about the basics — measures that anyone can use to reduce risks to their devices.

17. The Cybersecurity Writing Contest: Final Round Results Announced!

Hackers, Assemble! The final round’s results announcement of the Cybersecurity Writing Contest by Twingate & HackerNoon are now Live!

18. Fetch.ai Releases DabbaFlow: Encrypted File Sharing Platform for Secure Data Transfers

DabbaFlow, an end-to-end encrypted file-sharing platform developed by Fetch.ai, a Cambridge-based artificial intelligence lab, was launched recently.

19. Crypto Wallets Exposed "Mnemonic Phrase Vulnerabilities" (4 Already Fixed)

MetaMask and Phantom said today that they had patched a security flaw that could, in some cases, allow attackers to obtain mnemonic phrases.

20. The Black Market for Data is on the Rise

Once the laughingstock of the Internet, hackers are now some of the most wanted criminals in the world.

21. The Essential Guide to Security and Compliance for the Public Cloud

Using an Infrastructure-as-a-Service provider makes it easier to achieve and maintain compliance, but here are some caveats to consider.

22. Is Open Source Software A Practical Alternative?

Privacy and cybersecurity have been ongoing concerns in recent years. Open-source software can be a solution to these concerns, is it really the case?

23. Tor: Love and Cybersecurity Thunder

Tor and The Guardian (of the Journalistic Galaxy) also took their relationship to the next level.

24. Cybersecurity Threats in Crypto Exchanges Everyone Should Know

Cybercriminals have turned to utilizing a variety of tools and strategies aimed to target cryptocurrency exchange customers, steal their money, or steal.

25. How Can I Tell if My Steam Account Has Been Hacked? (and How to Recover It)

his time, I would like to focus on Steam account security, which has recently gotten some attention in the community after waves of phishing attacks.

26. How to Avoid Credit Card Skimming: 5 Tips to Keep Your Information Safe

Credit card skimming occurs when someone places an electronic device on or near a credit card reader. This device captures and stores your credit card details.

27. The Biggest Cyber Security Threat of 2022 is Social Engineering

The biggest threat to cybersecurity in 2022 is social engineering. This type of cybercrime involves manipulating people into giving up sensitive information

28. The Cybersecurity Writing Contest 2022: Round 1 Results Announced!

Hackers, Assemble! Here we are with the results announcement of the Cybersecurity Writing Contest!

29. How to Keep Your Mobile Devices Secure

Our phones are our lifelines. They hold our prized possessions such as photos, music, and texts from our loved ones. So, why wouldn’t we do everything we can to

30. A Comprehensive Guide to Security Certification for SaaS

In this article, we will explore what security certification for SaaS is, its importance, and how to get the best out of it by minimizing the risks.

31. The Cybersecurity Writing Contest by Twingate and HackerNoon

Yasssss The Cybersecurity Writing Contest is here! HackerNoon is excited to host the contest in collaboration with Twingate!

32. Fighting the Hydra of DDoS Attacks (Spoiler: They Got Worse)

Interview with Link11 regarding their new DDoS report -- the state of DDoS attacks.

33. The Best Cybersecurity Practices for Data Centres

Read on to learn about the specifications of data center security and the risks that threaten it. Discover the cybersecurity best practices that you need.

34. How To Protect Copyrighted Digital Content In The Age Of Cyber-Fraud?

Today it is a hot topic how to protect copyrighted digital content. The most popular ways are DRM, HDCP, and Denuvo. I`ll shortly discuss them with their cons.

35. ANSI X12 EDI Basics: A Guide to the ANSI X12 Standards

ANSI X12 EDI is one of the most important concepts that you must be aware of prior to implementing EDI in your organization.

36. Mobile Banking: 5 Rules of Safety You Should Know

How safe it is to use mobile applications and web versions of banks to make payments?

37. How “Predictive Text” Functionality can Reproduce Mnemonic Crypto Wallet Phrases

Redditor Andre, an information security practitioner, accidentally discovered that the smartphone's "predictive words" function guessed the mnemonic of his bitc

38. Reverse Social Engineering: A Call to Quit Sharing More Than Necessary

Social engineering is the use of a person's sensitive information to launch a targeted cyber-attack on them. Reverse social engineering mitigates the rate...

39. An Intro to Zero Trust Architecture

Zero Trust isn’t a new concept. It was first presented in 2009 by John Kindervag, a former principal analyst at Forrester Research.

40. How Blockchain has Improved Detection of Malware

Blockchain has not only become the fundamental technology for cryptocurrencies; it has also become a reliable means of detecting malware quickly and accurately.

41. Security Infrastructure and the Multi-Cloud

Achieving high-availability cloud architecture requires more than one cloud. From an architecture perspective, there are only three options for mission critical

42. The 5 Things Businesses Need to Know to Stop Online Fraud!

The 5 Things Businesses Need to Know to Stop Online Fraud!

43. AI and Data: Balancing Progress, Privacy, and Security

With ChatGPT dominating the tech and other news, the concernabout data security might have momentarily taken a back seat. Yet, the expansion of AI/ML technologies' potential impact on Data privacy and security should sound the alarm for organizations and individuals alike.

44. Software Development Tricks Coding for Beginners and More

This week on HackerNoon's Stories of the Week, we looked at three articles that covered the world of software development from employment to security.

45. How to Protect your ERP System Against Cyber Attacks

How to protect your ERP system against cyber attacks?

46. Blind Attacks: Understanding CSRF (Cross Site Request Forgery)

This article contains complete (and step-by-step) information about CSRF attacks.

47. 0-Days are on the Rise and that Means a Lot More Work for SOC Teams

In a recent report by the incident response giant Mandiant, which was purchased by Google in March, their researchers found that 2021 was a record year.

48. The Cybersecurity Writing Contest 2022: Round 5 Results Announced!

Hackers, Assemble! Here we are with the fifth round’s results announcement of the Cybersecurity Writing Contest by Twingate & HackerNoon!

49. Crucial Cloud Computing Security Threats Everyone Should Know

A rundown of the business impact and mitigation measures of the top cloud computing security threats from the 2022 Cloud Security Alliance survey

50. Incomplete Guide for Securing Containerized Environment

Write Once, Run Everywhere embraces flexibility of spinning applications up and down for users. Let's find out why and how to secure containerized environment.

51. Hacked: MetaMask User Lost US$81,000 In ETH

Crypto investor Jonny Reid shared his experience of stealing encrypted assets in his MetaMask wallet on Twitter. He is still unable to find the hack.

52. Network Security: Things Most People Don’t Think About

There are a lot of things most people do not think about that can dramatically increase the level of security on a network

53. The Cybersecurity Writing Contest 2022: Round 4 Results Announced!

Hackers, Welcome back! Here we are again with the fourth round of the Cybersecurity Writing Contest result announcement by Twingate & HackerNoon!

54. Explaining Info-Sec in Layman's Terms [Part I]

Understanding the common keywords used in the info-sec industry that are used in conjunction with that complicated OWASP Top 10 WAST

55. What is Credit Card Skimming and How Do You Prevent it?

This story describes what credit card skimming is and how to prevent it.

56. A Comprehensive Guide to OpenAPI Specification

OpenAPI Specification (formerly Swagger Specification) is an API description format for REST APIs. An OpenAPI file allows you to describe your entire API.

57. An Intro to Multi-Factor Authentication and the Types of MFA

This is an introduction to multi-factor authentication in the field of cybersecurity.

58. 5 Ways SaaS Can Help Speed Up Cybersecurity Implementation

SaaS is making cybersecurity implementation less expensive and easy, and businesses, especially startups, are now leveraging its tools to drive efficiency.

Thank you for checking out the 58 most read stories about Cybersecurity Writing Contest on HackerNoon.

Visit the /Learn Repo to find the most read stories about any technology.