NZ Cyber Security Challenge Simulates Drone Attacks

Around 400 aspiring cyber-crime fighters will attempt to infiltrate a horde of killer drones, manufactured by a criminal group. 

It's part of this year's New Zealand Cyber Security Challenge, with high school pupils, university students and industry workers battling it out to be crowned the country's drone hacking hero. 

Drones are a scary threat to cyber security, thinks Dr Ryan Ko, who set up NZ's first Master of Cyber Security degree at the University of Waikato and shooting the killer contraptions down isn't the answer.  Instead, contestants have to find the source, or the mother ship, and use coding to emulate it. 

"They call it the man in the middle attack," Ko, who helps to organise the challenge, said. "The race is on for researchers to create new technology that can allow and power people to stop incoming drones. 

"The challenge now is criminals are more advanced and more creative than the people protecting them."

The top 150 cyber-crime fighters will compete in the final three challenges, with the winner scoring NZ$2550. 

This year, 12-year-old Ashton Warner's taking part. He's been brought along by his 18-year-old brother, Logan Warner, who's attending his third year at Waikato. Drone hacking is new to both of them, but Ashton is already familiar with about five different web codes. The Auckland-based brothers hope to go into the cyber security business one day. "The challenges get harder every year," Logan said.  

Stuff

You Might Also Read: 

North Korean Cyber 'tunneling' In New Zealand:

New Zealand’s Defence Is Playing Catch Up:
 

« Kremlin Hacking Crew Take A 'Roman Holiday'
Trump Blames Obama For Russian Cyber-Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Anomali

Anomali

Anomali delivers intelligence-driven cybersecurity solutions to enhance threat visibility, automate threat processing and detection, and accelerate threat investigation, response, and remediation.

PCI Pal

PCI Pal

PCI Pal’s secure cloud payment solutions are certified to the highest level of security by the leading card companies.

Oneconsult

Oneconsult

Oneconsult provides cyber security services focusing on penetration tests / ethical hacking, ISO 27001 security audits and incident response & IT forensics.

Moxa

Moxa

Moxa is a leading provider of industrial networking, computing, and automation solutions for enabling the Industrial Internet of Things.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

Findings

Findings

Findings (formerly IDRRA) is a scalable AI powered assessment platform that streamlines security compliance across sectors, jurisdictions and regulatory frameworks.

certSIGN

certSIGN

certSIGN develop innovative software for information security and information systems protection.

Redbelt Security

Redbelt Security

Redbelt is a cyber security consultancy. We integrate people, systems, services and products to transform how your information security is delivered.

Upfort

Upfort

Upfort (formerly Paladin Cyber) unifies award-winning security and robust cyber insurance to deliver comprehensive cyber risk solutions.

ShorePoint

ShorePoint

ShorePoint helps customers focus on visibility, analytics and context to make timely and informed risk-based decisions to protect their infrastructure.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

RevealSecurity

RevealSecurity

RevealSecurity's TrackerIQ detects malicious activities in enterprise applications.

BCyber

BCyber

BCyber is a Swiss Cyber Security company that provides security products, training, and managed services to protect diverse IT and OT environments against cyber, physical, and cyber-physical threats.

Telesystem

Telesystem

Telesystem empowers businesses across the USA with a range of innovative network, communication and collaboration solutions.

Corsearch

Corsearch

Combining AI-powered technology and decades of industry expertise, Corsearch is revolutionizing how companies establish and protect their brands.

ReachOut Technology

ReachOut Technology

ReachOut is a transformative approach to IT Security, Support, and Guidance. But we’re more than that. We’re passionate IT experts driven to make solutions to your problems.