Security News
![At Defcon, hackers get their own private cell network: Ninja Tel](/static/build/img/news/alt/data-breach-stats-small.jpg)
http://arstechnica.com/security/2012/07/ninja-tel-hacker-phone-network/ By Dan Goodin Ars Technica July 28 2012
![Michaels Breach: Fraudsters Sentenced](/static/build/img/news/alt/breach-statistics-small.jpg)
http://www.bankinfosecurity.com/michaels-breach-fraudsters-sentenced-a-4991 By Tracy Kitten BankInfo Security July 30, 2012
![Credit Card Roulette: Payment Terminals Pwned in Vegas](/static/build/img/news/alt/antivirus-stats-small.jpg)
http://www.wired.com/threatlevel/2012/07/pinpadpwned/ By Kim Zetter Threat Level Wired.com July 30, 2012
![Quick moderators note - Black Hat USA / DEF CON 2012](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
Just a little heads-up... I will be covering Black Hat USA & DEF CON in Las Vegas.
![Hacker Will Expose Potential Security Flaw In Four Million Hotel Room Keycard Locks](/static/build/img/news/alt/cyberthreat-stats-small.jpg)
http://www.forbes.com/sites/andygreenberg/2012/07/23/hacker-will-expose-potential-security-flaw-in-more-than-four-million-hotel-room-keycard-locks/ By Andy Greenberg Forbes.com 7/23/2012
![Manufacturer declares death of bugs Stuxnet used to sabotage Iran nukes](/static/build/img/news/alt/cybercrime-statistics-small.jpg)
http://arstechnica.com/security/2012/07/industial-bugs-exploited-by-stuxnet-fixed/ By Dan Goodin Ars Technica July 23 2012
![Beth Israel suffers large data breach](/static/build/img/news/alt/cybersecurity-breach-statistics-small.jpg)
http://www.cmio.net/index.php?option=com_articles&view=article&id=34638:beth-israel-suffers-large-data-breach By Beth Walsh CMIO.net July 23, 2012
![Russiaâs Top Cyber Sleuth Foils US Spies, Helps Kremlin Pals](/static/build/img/news/alt/Geopolitical-Cybersecurity-Predictions-2-small.jpg)
http://www.wired.com/dangerroom/2012/07/ff_kaspersky/ By Noah Shachtman Danger Room Wired.com July 23, 2012
![Computer game secures crypto systems from rubber hose attacks](/static/build/img/news/alt/malware-statistics-2-scaled-small.jpg)
http://arstechnica.com/security/2012/07/guitar-hero-crypto-blunts-rubber-hose-attacks/ By Dan Goodin Ars Technica July 20, 2012
![Agencies to dole out new hardware keys for secret networks](/static/build/img/news/alt/web-statistics-2-small.jpg)
http://www.nextgov.com/cybersecurity/2012/07/agencies-dole-out-new-hardware-keys-secret-networks/56907/ By Aliya Sternstein Nextgov July 20, 2012