paint-brush
The Cybersecurity Writing Contest 2022: Round 4 Results Announced!by@hackernooncontests
760 reads
760 reads

The Cybersecurity Writing Contest 2022: Round 4 Results Announced!

Too Long; Didn't Read

The FIRST place goes to How an 18-Year-Old Teen Breached Uber Without Hacking a Single System by @antagonist. In the SECOND place, as well as the winner of the Most Read Story, we have The Infamous Hacker Bjorka's Top 7 Leaks that Shocked the Public by @dailyabay. Last but not least, the THIRD place goes to What is ARP Spoofing and How to Protect Against It? by @officercia.

People Mentioned

Mention Thumbnail
Mention Thumbnail

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - The Cybersecurity Writing Contest 2022: Round 4 Results Announced!
HackerNoon Writing Contests Announcements HackerNoon profile picture

Hackers, Welcome back! Here we are again with the fourth round of the Cybersecurity Writing Contest result announcement by Twingate & HackerNoon!


How do we enter the contest? Easy-peasy. Simply share any story on #cybersecurity. Here’s your complete guide on how to enter the cybersecurity writing contest.

The Cybersecurity Writing Contest September 2022 Nominations

We picked all the stories tagged with the #cybersecurity tag on HackerNoon, published in July 2022. As usual, we chose the top stories using 60:30:10 weightage respectively to:


  • Number of hours read
  • The number of people reached
  • The freshness of the content

Here are the top 10 nominations for the fourth round:

  1. How an 18-Year-Old Teen Breached Uber Without Hacking a Single System by @antagonist.
  2. The Infamous Hacker Bjorka's Top 7 Leaks that Shocked the Public by @dailyabay.
  3. Violent Attack Vectors in Web3: A Detailed Review by @officercia.
  4. How to Create a Random Password Generator Using Python by @terieyenike.
  5. 5 Ways to Protect Yourself From Getting Scammed in the Crypto World by @dimenkodima.
  6. “Hackers for Hire” Is a Rising Industry That Demands Ethical Considerations by @craiglebrau.
  7. What is ARP Spoofing and How to Protect Against It? by @officercia.
  8. The Massive Uber Hack: Technical and Legal Implications by @aswagaawy.
  9. A Former Hacker’s 10 Tips on Staying Safe Online by @propublica.
  10. How to Encrypt a PDF Using Python by @terieyenike.

Winners!

The editors then voted for the top stories. Here are the winners for the month of September 2022:

The FIRST place goes to How an 18-Year-Old Teen Breached Uber Without Hacking a Single System by @antagonist.

“The user went all in. Very timely and insightful story in the wake of the massive Uber leak (and a reminder to take your organization's phishing seminars seriously).” - HackerNoon Editor

Great job @antagonist !! You have won 500 USD!

In the SECOND place, as well as the winner of the Most Read Story, we have The Infamous Hacker Bjorka's Top 7 Leaks that Shocked the Public by @dailyabay.

“A listicle...but done the right way!” - HackerNoon Editor


21,000+ reads! Damn. Congratulations @dailyabay, you have won 300+100=400 USD!

Last but not least, the THIRD place goes to What is ARP Spoofing and How to Protect Against It? by @officercia.

“Spoof” sounds like a sound effect for an airbag going off in a car or something. Sure, “spoofing” sounds like a funny word but when it comes to security it is anything but. It is the intentional act of camouflaging malicious actors and intent under the guise of legitimate behavior.”


Great story @officercia. You have won 100 USD!!


Congratulations again to all the winners, and best of luck to the nominees and future participants of the Cybersecurity Writing Contest. Let’s wrap up the announcement! We will contact the winners shortly. Keep an eye on contests.hackernoon.com to see the current and upcoming writing contests!