Hackers, the Round 2 Results for the are here! For those who are reading about it for the first time - & HackerNoon are excited to host a You can win rewards from a $1,000 monthly prize pool. Cybersecurity Writing Contest Twingate Cybersecurity Writing Contest! Share your ! The competition is getting tougher. This month we received some REALLY fantastic entries. So good luck y’all; the bar is high. cybersecurity stories today The Cybersecurity Writing Contest July 2022 Nominations We picked all the stories tagged with the tag on HackerNoon, published in July 2022. As usual, we chose the top stories using weightage respectively to: #cybersecurity 60:30:10 Number of hours read The number of people reached The freshness of the content Here are the top 10 nominations for the second round: by How to Avoid Credit Card Skimming: 5 Tips to Keep Your Information Safe @DawoodKMasood by How To Find Out If A Hacker Has Attacked You @angfaw9 by What is Credit Card Skimming and How Do You Prevent it? @turbulence by How My Mother Got Hacked by a Phishing Attack @fatman by Essential OSINT Resources in 2022 @officercia by Remembering and Honoring the Cybersecurity Pioneer John McAfee @nebojsa.todorovic by This Vulnerability May Allow Hackers to Steal Your Ether @officercia by How Secure Are Blockchain Networks Today @gabrielmanga by Explaining Info-Sec in Layman's Terms [Part II] @heydanny by What is BGP Hijacking and How Do You Prevent It? @thecloudarchitect Winners! The editors then voted for the top stories. Here are the winners for the month of July: In the first place, we have by How To Find Out If A Hacker Has Attacked You @angfaw9 Congratulations on winning 500 USD!, :) @angfaw9 Many hackers make a living by redirecting your browser to a link other than the one you want. Unfortunately, to date many of the redirected Internet searches are well hidden from the user through the use of additional proxies, so the bogus results are never returned to alert the user. by has won the second position! How My Mother Got Hacked by a Phishing Attack @fatman A carefully crafted phishing email lacking typos or bizarre grammar is important to the success of the phishing campaign. The email she received was similar to this one with the subject line: Verify Your Google Account. The editors enjoyed your story ! You have won 300 USD! @fatman In the third place, we have by Remembering and Honoring the Cybersecurity Pioneer John McAfee @nebojsa.todorovic The last couple of years, especially the last one, were… Yeah, it’s not easy to come up with the right word(s). We have been totally numbed, haven’t we? Nothing and no one can’t surprise or shock us anymore. How long did the news about John McAfee’s death occupy your thoughts? Long enough to remind us about his controversies, and not long enough to remember his achievements. Excellent storytelling, ! You have won 100 USD this month! @nebojsa.todorovic The most-read story this month is by with MASSIVE 76,571 reads so far. How to Avoid Credit Card Skimming: 5 Tips to Keep Your Information Safe @DawoodKMasood Wow, look at those numbers . You’ve won 100 USD. @DawoodKMasood One of the best ways to avoid credit card skimming is to pay attention to your surroundings when you're using your card. If you notice anything suspicious about the credit card reader, don't use it. You should also check your billing statement regularly to make sure that all of the charges are legitimate. Finally, if you're ever in doubt, you can always contact your credit card company to ask about suspicious charges. Let’s wrap up the announcement! We will contact the winners shortly. Keep an eye on to see the current and upcoming writing contests! contests.hackernoon.com