{"67436":{"#nid":"67436","#data":{"type":"external_news","title":"Careful With That Call","body":[{"value":"\u003Cp\u003ENow is the time to begin defending voice over IP before hackers and thieves go after its vulnerabilities just as they\u0027ve done with Simple Mail Transfer Protocol (SMTP). There is no reason to believe the bad guys will not exploit this, says Professor Mustaque Ahamad, director of the Georgia Tech Information Security Center. \u003Cbr \/\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27154","created_gmt":"2011-06-17 11:35:05","changed_gmt":"2016-10-08 02:24:41","author":"Louise Russo","boilerplate_text":"","field_publication":"","publication":"In the Solitude of Cotton Fields","field_article_url":"","publication_url":"http:\/\/www.gcn.com\/Articles\/2008\/05\/02\/Careful-with-that-call.aspx","dateline":{"date":"2009-07-08T00:00:00-04:00","iso_date":"2009-07-08T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}