<node id="71279">
  <nid>71279</nid>
  <type>news</type>
  <uid>
    <user id="27174"><![CDATA[27174]]></user>
  </uid>
  <created>1318590091</created>
  <changed>1475896226</changed>
  <title><![CDATA[Cellphones a Way to Attack Protected Devices]]></title>
  <body><![CDATA[]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2011-10-14T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>Compromised phones will infect the computers they plug into, much the same way malware such as Stuxnet found its way onto laptops via thumb drives, says the new 2012 Emerging Cyber Threats Report, released this week at the Georgia Tech Cyber Security Summit. <em>Source: IT World</em></p><p>&nbsp;</p>]]></value>
    </item>
  </field_summary>
  <field_media>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
      </og_groups_both>
  <field_categories>
      </field_categories>
  <core_research_areas>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
          <link>
      <url>http://www.itworld.com/security/212299/cellphones-will-become-way-attack-otherwise-protected-devices-report</url>
      <title></title>
      </link>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>345</tid>
        <value><![CDATA[cyber security]]></value>
      </item>
          <item>
        <tid>14717</tid>
        <value><![CDATA[Emerging Cyber Threats Report]]></value>
      </item>
          <item>
        <tid>10567</tid>
        <value><![CDATA[Georgia Tech Information Security Center]]></value>
      </item>
          <item>
        <tid>2678</tid>
        <value><![CDATA[information security]]></value>
      </item>
          <item>
        <tid>12739</tid>
        <value><![CDATA[mobile devices]]></value>
      </item>
          <item>
        <tid>11017</tid>
        <value><![CDATA[Mustaque Ahamad]]></value>
      </item>
          <item>
        <tid>166941</tid>
        <value><![CDATA[School of Computer Science]]></value>
      </item>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
