NZ Cyber Security Challenge Simulates Drone Attacks

Around 400 aspiring cyber-crime fighters will attempt to infiltrate a horde of killer drones, manufactured by a criminal group. 

It's part of this year's New Zealand Cyber Security Challenge, with high school pupils, university students and industry workers battling it out to be crowned the country's drone hacking hero. 

Drones are a scary threat to cyber security, thinks Dr Ryan Ko, who set up NZ's first Master of Cyber Security degree at the University of Waikato and shooting the killer contraptions down isn't the answer.  Instead, contestants have to find the source, or the mother ship, and use coding to emulate it. 

"They call it the man in the middle attack," Ko, who helps to organise the challenge, said. "The race is on for researchers to create new technology that can allow and power people to stop incoming drones. 

"The challenge now is criminals are more advanced and more creative than the people protecting them."

The top 150 cyber-crime fighters will compete in the final three challenges, with the winner scoring NZ$2550. 

This year, 12-year-old Ashton Warner's taking part. He's been brought along by his 18-year-old brother, Logan Warner, who's attending his third year at Waikato. Drone hacking is new to both of them, but Ashton is already familiar with about five different web codes. The Auckland-based brothers hope to go into the cyber security business one day. "The challenges get harder every year," Logan said.  

Stuff

You Might Also Read: 

North Korean Cyber 'tunneling' In New Zealand:

New Zealand’s Defence Is Playing Catch Up:
 

« Kremlin Hacking Crew Take A 'Roman Holiday'
Trump Blames Obama For Russian Cyber-Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Zerto

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments.

Minerva Labs

Minerva Labs

Minerva’s patent pending solution keeps malware in a constant sleep state before it can infiltrate your network and cause any damage.

Cyanre

Cyanre

Cyanre delivers state of the art cyber forensic services through software technologies and procedures that exceed conformities of major law enforcement agencies across the globe.

Igloo Security

Igloo Security

Igloo Security is a leader and pioneer in SIEM (Security Information & Event Management), PSIM (Physical Security Information Management) and MSS (Managed Security Services).

Sqreen

Sqreen

Sqreen is a web application security monitoring and protection solution helping companies protect their apps and users from attacks.

Netsurion

Netsurion

Netsurion powers secure and agile networks for highly distributed and small-to-medium enterprises and the IT providers that serve them.

3wSecurity

3wSecurity

3wSecurity provides visibility to your company’s internet facing systems throughout the security life cycle, allowing for a more thorough approach to vulnerability management.

Sourcepass

Sourcepass

Sourcepass is an IT consulting company that focuses on providing expert IT services, cloud computing solutions, cybersecurity services, website, and application development.

Celebrus

Celebrus

Celebrus Fraud Data Platform, by D4t4 Solutions, works with existing fraud structures to augment functionality and turn fraud management into true fraud prevention.

Valtix

Valtix

Valtix is the first and only multi-cloud network security platform delivered as a service that enables cloud teams to meet the most stringent security requirements in a cloud-first & simple way.

Otava

Otava

Otava is a global leader of secure, compliant hybrid cloud and IT solutions for service providers, channel partners and enterprise clients.

Hexens

Hexens

Hexens introduces a whole new approach to cybersecurity solutions. Indisputable skills and a unique super-focused perspective on every single case are the values we create.

inSOC

inSOC

inSOC is an enterprise-grade AI-driven SOCaaS solution detecting breaches 24/7 with vulnerability management built-in. Designed for MSPs and MSSPs.

Orchestrate Technologies

Orchestrate Technologies

Orchestrate Technologies provides computer network and IT managed services for small and mid-market clients as well as small enterprise businesses.

CMIT Solutions

CMIT Solutions

CMIT Solutions is a recognized leader in Managed IT Services for businesses. We empower businesses like yours by providing innovative technology solutions, managed IT services and cybersecurity.

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.