<node id="71286">
  <nid>71286</nid>
  <type>external_news</type>
  <uid>
    <user id="27174"><![CDATA[27174]]></user>
  </uid>
  <created>1318592395</created>
  <changed>1475893509</changed>
  <title><![CDATA[New Cyber Threats Expected in 2012]]></title>
  <body><![CDATA[<p>Mobile devices will become an even more attractive target for cyber criminals in 2012, according to the 2012 Emerging Cyber Threats Report, issued during this week's Georgia Tech Cyber Security Summit. "You have to do your due diligence" before downloading mobile apps, says Mustaque Ahamad (<em>Computer Science</em>). <em>Source: WABE</em></p>]]></body>
  <field_article_url>
    <item>
      <url><![CDATA[http://www.publicbroadcasting.net/wabe/news.newsmain/article/1/0/1862490/Atlanta./New.Cyber.Threats.Expected.in.2012]]></url>
      <title><![CDATA[]]></title>
    </item>
  </field_article_url>
  <field_publication>
    <item>
      <value><![CDATA[ 2022 benefits ]]></value>
    </item>
  </field_publication>
  <field_dateline>
    <item>
      <value></value>
      <timezone></timezone>
    </item>
  </field_dateline>
  <field_media>
        </field_media>
  <og_groups>
          <item>47223</item>
          <item>50875</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[School of Computer Science]]></item>
      </og_groups_both>
    <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
