NZ Cyber Security Challenge Simulates Drone Attacks

Around 400 aspiring cyber-crime fighters will attempt to infiltrate a horde of killer drones, manufactured by a criminal group. 

It's part of this year's New Zealand Cyber Security Challenge, with high school pupils, university students and industry workers battling it out to be crowned the country's drone hacking hero. 

Drones are a scary threat to cyber security, thinks Dr Ryan Ko, who set up NZ's first Master of Cyber Security degree at the University of Waikato and shooting the killer contraptions down isn't the answer.  Instead, contestants have to find the source, or the mother ship, and use coding to emulate it. 

"They call it the man in the middle attack," Ko, who helps to organise the challenge, said. "The race is on for researchers to create new technology that can allow and power people to stop incoming drones. 

"The challenge now is criminals are more advanced and more creative than the people protecting them."

The top 150 cyber-crime fighters will compete in the final three challenges, with the winner scoring NZ$2550. 

This year, 12-year-old Ashton Warner's taking part. He's been brought along by his 18-year-old brother, Logan Warner, who's attending his third year at Waikato. Drone hacking is new to both of them, but Ashton is already familiar with about five different web codes. The Auckland-based brothers hope to go into the cyber security business one day. "The challenges get harder every year," Logan said.  

Stuff

You Might Also Read: 

North Korean Cyber 'tunneling' In New Zealand:

New Zealand’s Defence Is Playing Catch Up:
 

« Kremlin Hacking Crew Take A 'Roman Holiday'
Trump Blames Obama For Russian Cyber-Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NetExtend

NetExtend

NetExtend services include backup and recovery, endpoint protection, network monitoring, cloud portal and billing and payment solutions.

ComTrue Technologies

ComTrue Technologies

ComTrue Technologies provides artificial intelligence solutions and information security solutions.

SolutionsPT

SolutionsPT

SolutionsPT enables customers to strengthen their Operational Technology (OT) network to meet the ever increasing demand for performance, availability, connectivity and security.

Penningtons Manches Cooper

Penningtons Manches Cooper

Penningtons Manches Cooper is a leading UK law firm providing high quality legal advice in areas including Data Protection, Cyber Security and Cyber Crime.

IFE Digital Systems

IFE Digital Systems

IFE Digital Systems conducts research, development and consultancy in risk, safety and security related to digital systems in critical infrastructure.

NuCrypt

NuCrypt

NuCrypt is developing technology that is applicable to ultrahigh security data encryption as well as key distribution.

DeepView

DeepView

DeepView delivers a unified platform for managing risk on digital platforms. One interactive secure portal allowing employees to engage their networks securely and compliantly.

Meterian

Meterian

The Meterian Platform is a fuss-free solution to protect you against vulnerabilities in your app’s software supply chain.

DataSolutions

DataSolutions

DataSolutions is a leading value-added distributor of transformational IT solutions in the UK and Ireland.

Babble

Babble

Babble is a Unified Comms, Contact Centre and Cyber Solutions provider. We believe in making next-generation technology simple to use, deploy and manage.

Cyberguardians

Cyberguardians

Cyberguardians is a team of experienced cybersecurity experts and consultants who always believe in the value and a high level of cybersecurity services to clients.

CampusGuard

CampusGuard

CampusGuard focuses on the cybersecurity and compliance needs of campus-based organizations including higher education, healthcare, and state and local government.

MiC Talent Solutions

MiC Talent Solutions

MiC Talent Solutions provides recruiting, direct hire, augmented staff, and professional service contracting solutions for organizations searching for minority cybersecurity talent.

American Binary

American Binary

American Binary is a Quantum Safe Networking (TM) and post-quantum encryption company.

Prompt Security

Prompt Security

Prompt Security provides an LLM agnostic approach to ensure security, data privacy and safety across all aspects of Generative AI.

runZero

runZero

runZero delivers the most complete security visibility possible, providing you the ultimate foundation for successfully managing exposures and compliance.