<node id="71290">
  <nid>71290</nid>
  <type>external_news</type>
  <uid>
    <user id="27174"><![CDATA[27174]]></user>
  </uid>
  <created>1318592764</created>
  <changed>1475893509</changed>
  <title><![CDATA[Cellphones a Way to Attack Protected Devices]]></title>
  <body><![CDATA[<p>Compromised phones will infect the computers they plug into, much the same way malware such as Stuxnet found its way onto laptops via thumb drives, says the new 2012 Emerging Cyber Threats Report, released this week at the Georgia Tech Cyber Security Summit. <em>Source: IT World</em></p>]]></body>
  <field_article_url>
    <item>
      <url><![CDATA[http://www.itworld.com/security/212299/cellphones-will-become-way-attack-otherwise-protected-devices-report]]></url>
      <title><![CDATA[]]></title>
    </item>
  </field_article_url>
  <field_publication>
    <item>
      <value><![CDATA[ jonas chan ]]></value>
    </item>
  </field_publication>
  <field_dateline>
    <item>
      <value></value>
      <timezone></timezone>
    </item>
  </field_dateline>
  <field_media>
        </field_media>
  <og_groups>
          <item>47223</item>
          <item>50875</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[School of Computer Science]]></item>
      </og_groups_both>
    <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
