<node id="67436">
  <nid>67436</nid>
  <type>external_news</type>
  <uid>
    <user id="27154"><![CDATA[27154]]></user>
  </uid>
  <created>1308310505</created>
  <changed>1475893481</changed>
  <title><![CDATA[Careful With That Call]]></title>
  <body><![CDATA[<p>Now is the time to begin defending voice over IP before hackers and thieves go after its vulnerabilities just as they've done with Simple Mail Transfer Protocol (SMTP). There is no reason to believe the bad guys will not exploit this, says Professor Mustaque Ahamad, director of the Georgia Tech Information Security Center. <br /></p>]]></body>
  <field_article_url>
    <item>
      <url><![CDATA[http://www.gcn.com/Articles/2008/05/02/Careful-with-that-call.aspx]]></url>
      <title><![CDATA[]]></title>
    </item>
  </field_article_url>
  <field_publication>
    <item>
      <value><![CDATA[ In the Solitude of Cotton Fields ]]></value>
    </item>
  </field_publication>
  <field_dateline>
    <item>
      <value>2009-07-08</value>
      <timezone></timezone>
    </item>
  </field_dateline>
  <field_media>
        </field_media>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
      </og_groups_both>
    <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
