{"71279":{"#nid":"71279","#data":{"type":"news","title":"Cellphones a Way to Attack Protected Devices","body":"","field_subtitle":"","field_summary":[{"value":"\u003Cp\u003ECompromised phones will infect the computers they plug into, much the same way malware such as Stuxnet found its way onto laptops via thumb drives, says the new 2012 Emerging Cyber Threats Report, released this week at the Georgia Tech Cyber Security Summit. \u003Cem\u003ESource: IT World\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":"","uid":"27174","created_gmt":"2011-10-14 11:01:31","changed_gmt":"2016-10-08 03:10:26","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2011-10-14T00:00:00-04:00","iso_date":"2011-10-14T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"related_links":[{"url":"http:\/\/www.itworld.com\/security\/212299\/cellphones-will-become-way-attack-otherwise-protected-devices-report","title":"http:\/\/www.itworld.com\/security\/212299\/cellphones-will-become-way-attack-ot..."}],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"345","name":"cyber security"},{"id":"14717","name":"Emerging Cyber Threats Report"},{"id":"10567","name":"Georgia Tech Information Security Center"},{"id":"2678","name":"information security"},{"id":"12739","name":"mobile devices"},{"id":"11017","name":"Mustaque Ahamad"},{"id":"166941","name":"School of Computer Science"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}