NZ Cyber Security Challenge Simulates Drone Attacks

Around 400 aspiring cyber-crime fighters will attempt to infiltrate a horde of killer drones, manufactured by a criminal group. 

It's part of this year's New Zealand Cyber Security Challenge, with high school pupils, university students and industry workers battling it out to be crowned the country's drone hacking hero. 

Drones are a scary threat to cyber security, thinks Dr Ryan Ko, who set up NZ's first Master of Cyber Security degree at the University of Waikato and shooting the killer contraptions down isn't the answer.  Instead, contestants have to find the source, or the mother ship, and use coding to emulate it. 

"They call it the man in the middle attack," Ko, who helps to organise the challenge, said. "The race is on for researchers to create new technology that can allow and power people to stop incoming drones. 

"The challenge now is criminals are more advanced and more creative than the people protecting them."

The top 150 cyber-crime fighters will compete in the final three challenges, with the winner scoring NZ$2550. 

This year, 12-year-old Ashton Warner's taking part. He's been brought along by his 18-year-old brother, Logan Warner, who's attending his third year at Waikato. Drone hacking is new to both of them, but Ashton is already familiar with about five different web codes. The Auckland-based brothers hope to go into the cyber security business one day. "The challenges get harder every year," Logan said.  

Stuff

You Might Also Read: 

North Korean Cyber 'tunneling' In New Zealand:

New Zealand’s Defence Is Playing Catch Up:
 

« Kremlin Hacking Crew Take A 'Roman Holiday'
Trump Blames Obama For Russian Cyber-Attack »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Blue Solutions

Blue Solutions

Blue Solutions is a consultancy-led, accredited software distributor who provides IT solutions and support to small and medium enterprises.

RSA Insurance Group

RSA Insurance Group

RSA is one of the world’s leading multinational quoted insurance groups. Commercial services include cyber risk insurance.

PCI Pal

PCI Pal

PCI Pal’s secure cloud payment solutions are certified to the highest level of security by the leading card companies.

ThreatBook

ThreatBook

ThreatBook is dedicated to providing real-time, accurate and actionable threat intelligence to block, detect and prevent attacks.

Dell Technologies

Dell Technologies

Dell Technologies Consulting Services enables a highly resilient business amidst the proliferation of cloud-based IT services and constant threats to your most critical information.

Meriplex

Meriplex

Meriplex is a Managed Services provider specializing in Intelligent Networks, Cybersecurity and Cloud Communications.

Calyptix Security

Calyptix Security

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology.

Delfigo Security

Delfigo Security

Delfigo Security, a pioneer in intelligent authentication, provides a strong, multi-factor authentication solution to prevent identity theft and reduce fraud.

Point Predictive

Point Predictive

Point Predictive build Predictive Models using Artificial Intelligence and Machine Learning techniques that help our customers stop fraud and early payment default (EPD).

Kocho

Kocho

Kocho (formerly TiG) is a provider of identity and access, cyber security, cloud transformation, and managed IT services.

National Cryptologic Foundation (NCF) - USA

National Cryptologic Foundation (NCF) - USA

The National Cryptologic Foundation strives to influence the cryptologic future by sharing our educational resources, stimulating new knowledge, and commemorating our heritage.

ITSEC Asia

ITSEC Asia

ITSEC Asia works to effectively reduce exposure to information security threats and improve the effectiveness of its clients' information security management systems.

SharkStriker

SharkStriker

SharkStriker is a US based managed security services provider with SOCs and offices across the globe.

Route1

Route1

Route1 is an advanced provider of secure data intelligence solutions to drive your business forward.

Lasso Security

Lasso Security

Lasso Security is a pioneer cybersecurity company ensuring comprehensive protection for businesses leveraging generative AI and other large language model technologies.

Cyber Castle

Cyber Castle

Linux Demands Sophisticated, Purpose-Built Security. Cyber Castle is the solution. A safe, deployable platform down to the edge device for monitoring Linux security anywhere across the globe.