Techno Blender
Digitally Yours.

The Cybersecurity Writing Contest 2022: Round 3 Results Announced!

0 106


The FIRST and most-read prize goes to The Hidden Danger of QR Codes by @officercia. In the SECOND place, we have Expert: Facebook, IG App Can Steal Secrets, and Users Can’t Turn It Off! by @z3nch4n. Last but not least, the winner of the Most Read Story is @officercia AGAIN with 9300+ Reads (WOW!)

Hackers, Assemble! Here we are with the third round’s results announcement of the Cybersecurity Writing Contest by Twingate & HackerNoon!

Here are the nominations for the Cybersecurity Writing Contest August 2022

We picked all the stories tagged with the #cybersecurity tag on HackerNoon, published in August, 2022. Then we chose the top stories using 60:30:10 weightage respectively to:

  1. The Hidden Danger of QR Codes by @officercia.
  2. Expert: Facebook, IG App Can Steal Secrets, and Users Can’t Turn It Off! by @z3nch4n.
  3. Are VPNs Really Safe? by @chinuaezifeh.
  4. Ransomware-as-a-Service: SaaS’ Evil Twin by @akoredenate.
  5. An Ultimate List of Rules Net Survivors Should Follow to Stay Safe! by @officercia.
  6. GitHACK! We are the vulnerability by @sipping.
  7. How to Stay Safe When Browsing Online or Viewing Emails at Home or Work by @jazzmariekaur.
  8. Best Physical Security Practices for Your Server Room by @zacamos.
  9. Safeguarding Your Passwords from Cracking: Understanding the Math Concepts by @smoothmaruf.
  10. How to Implement JSON Web Token (JWT) in Java Spring Boot by@brilianfird

Winners!

The editors then voted for the top stories. Here are the winners for the month of August 2022:

“I’d call this piece a tiny research paper – a 4000+ words story covering various bugs and vulnerabilities in QR codes. Would love more stories on HackerNoon like this.” – HackerNoon Editor

Congratulations @officercia!! You have won 500 USD! 🙂

“This is a longtime contributor that always submits good stuff. This piece is an expose on how IG and FB are tracking our data and the writer goes over the issue well including screenshots and tweets.Moreover, the author provides ways we can fight this issue of data tracking.” – HackerNoon Editor

Congratulations on winning second position and 300 USD @z3nch4n.

“The RaaS to SaaS comparison is very educational – too often people shy away from learning about businesses in industries they don’t approve of, but sometimes, that is how you learn most about your own industry.” – HackerNoon Editor

Great Job, @akoredenate!! You have won 100 USD this month!!

Last but not least, the winner of the Most Read Story is @officercia AGAIN with 9300+ Reads (WOW!)

Congratulations (x2) @officercia!! You have won 100 USD!

Congratulations to all the winners, and best of luck to the nominees and future participants of the Cybersecurity Writing Contest. Let’s wrap up the announcement! We will contact the winners shortly. Keep an eye on contests.hackernoon.com to see the current and upcoming writing contests!

L O A D I N G
. . . comments & more!


The FIRST and most-read prize goes to The Hidden Danger of QR Codes by @officercia. In the SECOND place, we have Expert: Facebook, IG App Can Steal Secrets, and Users Can’t Turn It Off! by @z3nch4n. Last but not least, the winner of the Most Read Story is @officercia AGAIN with 9300+ Reads (WOW!)

Hackers, Assemble! Here we are with the third round’s results announcement of the Cybersecurity Writing Contest by Twingate & HackerNoon!

Here are the nominations for the Cybersecurity Writing Contest August 2022

We picked all the stories tagged with the #cybersecurity tag on HackerNoon, published in August, 2022. Then we chose the top stories using 60:30:10 weightage respectively to:

  1. The Hidden Danger of QR Codes by @officercia.
  2. Expert: Facebook, IG App Can Steal Secrets, and Users Can’t Turn It Off! by @z3nch4n.
  3. Are VPNs Really Safe? by @chinuaezifeh.
  4. Ransomware-as-a-Service: SaaS’ Evil Twin by @akoredenate.
  5. An Ultimate List of Rules Net Survivors Should Follow to Stay Safe! by @officercia.
  6. GitHACK! We are the vulnerability by @sipping.
  7. How to Stay Safe When Browsing Online or Viewing Emails at Home or Work by @jazzmariekaur.
  8. Best Physical Security Practices for Your Server Room by @zacamos.
  9. Safeguarding Your Passwords from Cracking: Understanding the Math Concepts by @smoothmaruf.
  10. How to Implement JSON Web Token (JWT) in Java Spring Boot by@brilianfird

Winners!

The editors then voted for the top stories. Here are the winners for the month of August 2022:

“I’d call this piece a tiny research paper – a 4000+ words story covering various bugs and vulnerabilities in QR codes. Would love more stories on HackerNoon like this.” – HackerNoon Editor

Congratulations @officercia!! You have won 500 USD! 🙂

“This is a longtime contributor that always submits good stuff. This piece is an expose on how IG and FB are tracking our data and the writer goes over the issue well including screenshots and tweets.Moreover, the author provides ways we can fight this issue of data tracking.” – HackerNoon Editor

Congratulations on winning second position and 300 USD @z3nch4n.

“The RaaS to SaaS comparison is very educational – too often people shy away from learning about businesses in industries they don’t approve of, but sometimes, that is how you learn most about your own industry.” – HackerNoon Editor

Great Job, @akoredenate!! You have won 100 USD this month!!

Last but not least, the winner of the Most Read Story is @officercia AGAIN with 9300+ Reads (WOW!)

Congratulations (x2) @officercia!! You have won 100 USD!

Congratulations to all the winners, and best of luck to the nominees and future participants of the Cybersecurity Writing Contest. Let’s wrap up the announcement! We will contact the winners shortly. Keep an eye on contests.hackernoon.com to see the current and upcoming writing contests!

L O A D I N G
. . . comments & more!

FOLLOW US ON GOOGLE NEWS

Read original article here

Denial of responsibility! Techno Blender is an automatic aggregator of the all world’s media. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials, please contact us by email – [email protected]. The content will be deleted within 24 hours.
Leave a comment