{"71286":{"#nid":"71286","#data":{"type":"external_news","title":"New Cyber Threats Expected in 2012","body":[{"value":"\u003Cp\u003EMobile devices will become an even more attractive target for cyber criminals in 2012, according to the 2012 Emerging Cyber Threats Report, issued during this week\u0027s Georgia Tech Cyber Security Summit. \u0022You have to do your due diligence\u0022 before downloading mobile apps, says Mustaque Ahamad (\u003Cem\u003EComputer Science\u003C\/em\u003E). \u003Cem\u003ESource: WABE\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27174","created_gmt":"2011-10-14 11:39:55","changed_gmt":"2016-10-08 02:25:09","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","publication":"2022 benefits","field_article_url":"","publication_url":"http:\/\/www.publicbroadcasting.net\/wabe\/news.newsmain\/article\/1\/0\/1862490\/Atlanta.\/New.Cyber.Threats.Expected.in.2012","extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[{"id":"345","name":"cyber security"},{"id":"14717","name":"Emerging Cyber Threats Report"},{"id":"10567","name":"Georgia Tech Information Security Center"},{"id":"2678","name":"information security"},{"id":"12739","name":"mobile devices"},{"id":"11017","name":"Mustaque Ahamad"},{"id":"166941","name":"School of Computer Science"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}