<node id="71289">
  <nid>71289</nid>
  <type>external_news</type>
  <uid>
    <user id="27174"><![CDATA[27174]]></user>
  </uid>
  <created>1318592680</created>
  <changed>1475893509</changed>
  <title><![CDATA[Can Charging a Cell Phone Take Down an IT System?]]></title>
  <body><![CDATA[<p>Cyber attacks on mobile phones have mostly targeted personal information, but that's likley to change. In the 2012 Emerging Cyber Threats Report, Georgia Tech information security experts predict mobile phones increasingly will be a vector to attack networks and critical systems. <em>Source: GovInfoSecurity.com</em></p>]]></body>
  <field_article_url>
    <item>
      <url><![CDATA[http://blogs.govinfosecurity.com/posts.php?postID=1086]]></url>
      <title><![CDATA[]]></title>
    </item>
  </field_article_url>
  <field_publication>
    <item>
      <value><![CDATA[ pedestrians ]]></value>
    </item>
  </field_publication>
  <field_dateline>
    <item>
      <value></value>
      <timezone></timezone>
    </item>
  </field_dateline>
  <field_media>
        </field_media>
  <og_groups>
          <item>47223</item>
          <item>50875</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[School of Computer Science]]></item>
      </og_groups_both>
    <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
