logo
Former Kiwis star takes heavy knock in runit event

Former Kiwis star takes heavy knock in runit event

Otago Daily Times13 hours ago

Footage from the event shows Proctor running towards a man, reportedly social media influencer Jordan Simi, colliding, and falling to the ground. Photo: Instagram / Runit League via RNZ
Former NRL and Kiwis forward Kevin Proctor took a heavy hit in the RUNIT 02 event in Dubai over the weekend.
A video of the event shows Proctor running towards a man, reportedly social media influencer Jordan Simi, who carries a ball.
The two collide sending Proctor into the air. He then falls to his side on the ground where he doesn't immediately move.
Staff rush towards him and help him into a sitting position as his leg kicks out.
Proctor, a former Kiwis rugby league international, played 22 games for New Zealand between 2012-2019.
The 36-year-old had a 14-year career in the NRL playing for Melbourne Storm from 2008-2016 and was a member of the 2012 premiership winning side.
He played for Gold Coast Titans from 2017-2022 but his contract was terminated after he posted a video of himself on social media vaping during the halftime break.
He then headed to England to Superleague side Wakefield Trinity before moving to France to play for semi-professional side AS Carcassone last year.
Health experts have raised concerns about Run It Straight events which they've called a "dangerous spectacle".
The risks were highlighted by the death of Ryan Satterthwaite, 19, in Palmerston North in May after he was critically injured playing a tackle game with friends.
At an Auckland event in May two men retired due to knocks to the head, one slumping to the ground and appearing to have a seizure.
Coroner Bruce Hesketh also took aim at the events which he said had "all the hallmarks of perilous activity that makes no attempt to mitigate head injury".

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

'Missed package? Scam fooling thousands
'Missed package? Scam fooling thousands

Techday NZ

time4 hours ago

  • Techday NZ

'Missed package? Scam fooling thousands

Package delivery scams are relentless, and no longer focus on shopping seasons and Christmas. NZ Post delivered more than 81.9 million courier parcels in the 12 months to 1 April 2024. Many Kiwis get too many packages to keep track of, and that's exactly what scammers are counting on. Delivery scams are evolving, and these days they can appear quite subtle. Look for these signs: Unprofessional layout and missing shipment details - The email design is sloppy, and key information like a real pickup address and customer account number is missing — not what you'd expect from DHL or NZ Post. - The email design is sloppy, and key information like a real pickup address and customer account number is missing — not what you'd expect from DHL or NZ Post. Suspicious email and links - Only an email address is shown (no real address), and the tracking link could redirect you to a phishing site. - Only an email address is shown (no real address), and the tracking link could redirect you to a phishing site. Urgent, pressuring language - The email tries to rush you into clicking quickly — classic tactic scammers use to trick people. - The email tries to rush you into clicking quickly — classic tactic scammers use to trick people. Custom payment requests – Even if it's just a small 'customs' fee, be cautious. New Zealand Customs does not contact individuals or businesses about paying customs duty. Imported goods are handled by licensed freight forwarders, not by NZ Customs. Below is an example. The email doesn't stand out particularly at first glance. And that's exactly why this example is so interesting: it strikes a balance between appearing legitimate and hiding the usual red flags often found in scam emails. One quick trick to check if an email is fake is to look at the sender's address. Does it really come from DHL or something odd like info@ Looking further into the email body, there's a button that clearly encourages the user to click and proceed. It's designed to appear as though it will take the recipient to DHL's official tracking page. The link actually goes to a site hosted on IPFS — a system that makes it hard to take things down, which is exactly why scammers love it. While this makes it harder to take malicious content offline, it also raises a red flag — this is not where you'd expect a legitimate DHL email to direct you. Since IPFS is compatible with modern browsers, it opens a landing page. The page doesn't display much information at all, but it personalises the scam by pre-filling the login field with the recipient's email address. That's a subtle but clever touch — it adds just enough legitimacy to convince some users to proceed. The site even blocks right-clicking so you can't inspect the code — a common trick scammers use to hide what they're really doing. The language selection links at the bottom are non-functional — clicking them does nothing. But most users won't bother to test those, so they serve a purely visual purpose: to make the site look more legitimate and avoid raising suspicion. At first glance, most of the code is dedicated to CSS styling — which is unusual, as this would typically be loaded from external files. Embedding so much CSS directly into the page is a strange choice and already raises some suspicion. But beyond the formatting, there are several indicators that strongly suggest this is a phishing site. The URL points to IPFS storage ( Real login portals (e.g., for Microsoft, Google, etc.) use official domains (like is a decentralised file storage system — no legitimate organisation will host login pages there. Form captures email and password with no backend: The form fields (email, password) do not submit anywhere obvious. Real login forms send credentials securely (HTTPS POST) to legitimate servers. Phishing forms either harvest the info silently or submit it to hidden malicious endpoints. Mix of languages links with no functionality: There are fake "language links" (Arabic, Czech, Danish, etc.) all pointing to the same broken IPFS page. On real sites, language selectors actually change the content dynamically. Poor HTML/CSS quality and broken elements: The code is poorly formatted, has broken inline styles, and excessive base64-encoded images. Real corporate web pages are carefully coded, fully polished, and use proper asset management (e.g., not massive inline blobs). The distribution of this scam shows New Zealand and Australia are real targets. Due to the generic nature of the landing page and the broad appeal of the phishing message, this scam can be deployed almost identically worldwide. This increases the attackers' chances of success by allowing them to trick users in multiple regions into handing over their credentials — which can then be repurposed for more targeted, high-value attacks. The threat is steadily increasing. The dips visible in the data typically correspond to weekends, suggesting that the most successful day to launch an attack is Monday — when people return to full inboxes and are still easing into the workweek. Aside from this pattern, the threat remains consistent and persistent. Gen Digital cybersecurity experts fully expect this scam, or variations of it, to continue appearing now and in the foreseeable future. Kiwis can protect themselves against these scams in five easy ways: Always check the email headers Look at the sender's email address closely — is it from a legitimate domain you recognise? Official companies will never use suspicious or unfamiliar domains. Look at the sender's email address closely — is it from a legitimate domain you recognise? Official companies will never use suspicious or unfamiliar domains. Examine the landing page Does the page look like what you expected? If something feels off, it probably is. Be especially wary if you're redirected to an unfamiliar URL. Does the page look like what you expected? If something feels off, it probably is. Be especially wary if you're redirected to an unfamiliar URL. Assess the design and formatting Most phishing emails are poorly designed. Look for inconsistent fonts, low-quality logos, or broken elements that a professional company would never send. Most phishing emails are poorly designed. Look for inconsistent fonts, low-quality logos, or broken elements that a professional company would never send. Watch for time pressure and manipulative language Scammers often create a false sense of urgency — claiming your package will be returned or your account will be locked unless you act immediately. Take a moment to verify before clicking. Scammers often create a false sense of urgency — claiming your package will be returned or your account will be locked unless you act immediately. Take a moment to verify before clicking. Do not share sensitive information Never give out personal or financial details in response to suspicious messages. Email scams aren't going away, but staying alert can keep you safe. Before you click, take a breath, check the sender, and when in doubt, go straight to the company's official website.

'Missed Package?' Scam Fooling Thousands
'Missed Package?' Scam Fooling Thousands

Scoop

time6 hours ago

  • Scoop

'Missed Package?' Scam Fooling Thousands

Press Release – Gen Digital The link actually goes to a site hosted on IPFS a system that makes it hard to take things down, which is exactly why scammers love it. While this makes it harder to take malicious content offline, it also raises a red flag this is not where … Package delivery scams are relentless, and no longer focus on shopping seasons and Christmas. NZ Post delivered more than 81.9 million courier parcels in the 12 months to 1 April 2024. Many Kiwis get too many packages to keep track of, and that's exactly what scammers are counting on. Delivery scams are evolving, and these days they can appear quite subtle. Look for these signs: Unprofessional Layout and Missing Shipment Details – The email design is sloppy, and key information like a real pickup address and customer account number is missing — not what you'd expect from DHL or NZ Post. Suspicious Email and Links – Only an email address is shown (no real address), and the tracking link could redirect you to a phishing site. Urgent, Pressuring Language – The email tries to rush you into clicking quickly — classic tactic scammers use to trick people. Custom Payment Requests – Even if it's just a small 'customs' fee, be cautious. New Zealand Customs does not contact individuals or businesses about paying customs duty. Imported goods are handled by licensed freight forwarders, not by NZ Customs. Below is an example. The email doesn't stand out particularly at first glance. And that's exactly why this example is so interesting: it strikes a balance between appearing legitimate and hiding the usual red flags often found in scam emails. One quick trick to check if an email is fake is to look at the sender's address. Does it really come from DHL or something odd like info@ Looking further into the email body, there's a button that clearly encourages the user to click and proceed. It's designed to appear as though it will take the recipient to DHL's official tracking page. The link actually goes to a site hosted on IPFS — a system that makes it hard to take things down, which is exactly why scammers love it. While this makes it harder to take malicious content offline, it also raises a red flag — this is not where you'd expect a legitimate DHL email to direct you. Since IPFS is compatible with modern browsers, it opens a landing page. The page doesn't display much information at all, but it personalises the scam by pre-filling the login field with the recipient's email address. That's a subtle but clever touch — it adds just enough legitimacy to convince some users to proceed. The site even blocks right-clicking so you can't inspect the code — a common trick scammers use to hide what they're really doing. The language selection links at the bottom are non-functional — clicking them does nothing. But most users won't bother to test those, so they serve a purely visual purpose: to make the site look more legitimate and avoid raising suspicion. At first glance, most of the code is dedicated to CSS styling — which is unusual, as this would typically be loaded from external files. Embedding so much CSS directly into the page is a strange choice and already raises some suspicion. But beyond the formatting, there are several indicators that strongly suggest this is a phishing site. The URL points to IPFS storage ( Real login portals (e.g., for Microsoft, Google, etc.) use official domains (like is a decentralised file storage system — no legitimate organisation will host login pages there. Form captures email and password with no backend: The form fields (email, password) do not submit anywhere obvious. Real login forms send credentials securely (HTTPS POST) to legitimate servers. Phishing forms either harvest the info silently or submit it to hidden malicious endpoints. Mix of languages links with no functionality: There are fake 'language links' (Arabic, Czech, Danish, etc.) all pointing to the same broken IPFS page. On real sites, language selectors actually change the content dynamically. Poor HTML/CSS quality and broken elements: The code is poorly formatted, has broken inline styles, and excessive base64-encoded images. Real corporate web pages are carefully coded, fully polished, and use proper asset management (e.g., not massive inline blobs). The distribution of this scam shows New Zealand and Australia are real targets. Due to the generic nature of the landing page and the broad appeal of the phishing message, this scam can be deployed almost identically worldwide. This increases the attackers' chances of success by allowing them to trick users in multiple regions into handing over their credentials — which can then be repurposed for more targeted, high-value attacks. The threat is steadily increasing. The dips visible in the data typically correspond to weekends, suggesting that the most successful day to launch an attack is Monday — when people return to full inboxes and are still easing into the workweek. Aside from this pattern, the threat remains consistent and persistent. Gen cybersecurity experts fully expect this scam, or variations of it, to continue appearing now and in the foreseeable future. Kiwis can protect themselves against these scams in five easy ways: Always check the email headers Look at the sender's email address closely — is it from a legitimate domain you recognise? Official companies will never use suspicious or unfamiliar domains. Examine the landing page Does the page look like what you expected? If something feels off, it probably is. Be especially wary if you're redirected to an unfamiliar URL. Assess the design and formatting Most phishing emails are poorly designed. Look for inconsistent fonts, low-quality logos, or broken elements that a professional company would never send. Watch for time pressure and manipulative language Scammers often create a false sense of urgency — claiming your package will be returned or your account will be locked unless you act immediately. Take a moment to verify before clicking. Do not share sensitive information Never give out personal or financial details in response to suspicious messages. Email scams aren't going away, but staying alert can keep you safe. Before you click, take a breath, check the sender, and when in doubt, go straight to the company's official website. About Gen Gen (NASDAQ: GEN) is a global company dedicated to powering Digital Freedom through its trusted consumer brands including Norton, Avast, LifeLock, MoneyLion and more. The Gen family of consumer brands is rooted in providing financial empowerment and cyber safety for the first digital generations. Today, Gen empowers people to live their digital lives safely, privately and confidently for generations to come. Gen brings award-winning products and services in cybersecurity, online privacy, identity protection and financial wellness to nearly 500 million users in more than 150 countries. Learn more at

New Criminal Offences For Coward Punches
New Criminal Offences For Coward Punches

Scoop

time7 hours ago

  • Scoop

New Criminal Offences For Coward Punches

Minister of Justice The Government is introducing specific coward punch offences to ensure perpetrators receive tougher sentences, Justice Minister Paul Goldsmith says. 'A 'coward punch' gets its name for obvious reasons. These attacks affect everyday Kiwis and are often committed by cowardly attackers, who strike when the victim is distracted. 'We know how dangerous they are. People can be killed or suffer lifelong brain injuries, yet perpetrators often receive lenient and insufficient sentences. 'This fulfils a commitment in the National/New Zealand First coalition agreement, to introduce legislation to create an offence for anyone who injures or kills someone with a coward punch. 'Specific offences will ensure the consequence reflects the gravity of the crime. 'It builds on our plan to restore law and order, which we know is working, and will help reduce the number of victims of violent crime.' The charges and penalties are: An assault offence for one punch attacks which cause grievous bodily harm with associated maximum penalties of: Eight years imprisonment when the offender intended to cause injury or acted with reckless disregard for safety, Fifteen years imprisonment when the offender intended to cause grievous bodily harm. A culpable homicide offence for a one punch attack which results in death with a maximum penalty of life imprisonment. Both new offences will be added to the Three Strikes Regime.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store