Hackers, Assemble! The final round’s results announcement of the Cybersecurity Writing Contest by Twingate & HackerNoon are now live!
This contest is one of the most happening contests to date. The numbers speak for themselves:
- We published total of 364 stories during the contest (the acceptance rate at HackerNoon is almost 50%)!
- Total reads generated was > ONE MILLION (1,069,876 to be exact)
- Total reading time generated so far: 4 months, 25 days, & 16 hours
The success of this contest is because of the whole HackerNoon community! Shoutout to our super-dope 35k+ contributors and millions of awesome readers!
As usual, we picked all the stories tagged with the #cybersecurity tag on HackerNoon, published in November 2022. Then we chose the top stories using 60:30:10 weightage respectively to:
- Number of hours read
- The number of people reached
- The freshness of the content
The Cybersecurity Writing Contest: Nominations and Winners:
-
Scanning 2.6 Million Domains for Exposed .Env Files by @sdcat
-
Disinformation-as-a-Service: Content Marketing’s Evil Twin by @verasmirnoff
-
Secure Coding Practices Every Developer Should Know by @gloriabradford
-
Top Emerging Cybersecurity Threats and How to Prevent Them From Happening to You by @induction
-
America’s Strangest Unsolved TV-Hack and The Story Behind It by @strateh76
Now let’s see who won
FIRST place goes to
One only has to look at the top influencers on Instagram or TikTok to see how a group could be easily persuaded to buy the next cool gadget. An exploit that you can plug into your computer, like USB-based plasma balls, fans, Mini-fridge, coffee warmers, LEDs, or even a charging cable.
Well deserved, @fatman. You have won $600!
In SECOND place, we have
On November 22, 1987, Chicago sports commentator Dan Roan covered the best moments of an American football game between the Chicago Bears and the Detroit Lions. It was a regular newscast following the evening news on local WGN-TV, of which Roan hosted several hundred.
At 9:14 p.m., the reporter disappeared from the TV screens.
Congratulations @strateh76, on securing second place! You won 300 USD!
The third position and most-read story award goes to
Since almost every web application accesses a database or uses some APIs to communicate with, these credentials must be passed to the application. If this is done using the .env file, the credentials are in plain text in this file. When the web server is misconfigured and this .env file is delivered by the web server, anyone can query this data. To do this, one can visit just a URL with a browser, such as: https://example.com/.env.
The dangerous aspect is that the passwords and secrets are in unencrypted form in the .env file.
Excellent story, @sdcat; you have won $200!
Let’s wrap up the announcement! We will contact the winners shortly. Keep an eye on contests.hackernoon.com to see the current and upcoming writing contests!
L O A D I N G
. . . comments & more!
The Cybersecurity Writing Contest: Final Round Results Announced!
Source: Trends Pinoy
0 Comments