{"71524":{"#nid":"71524","#data":{"type":"news","title":"Cybersecurity Threats to Pick Up Steam in 2012","body":"","field_subtitle":"","field_summary":[{"value":"\u003Cp\u003ESo many people use smartphones to surf the Web and store sensitive data, they\u0027ve become a prime target for hackers, says the 2012 Emerging Cyber Threats Report, issued last week at the Georgia Tech Cyber Security Summit. \u003Cem\u003ESource: Scientific American\u003C\/em\u003E\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":"","uid":"27174","created_gmt":"2011-10-18 11:09:06","changed_gmt":"2016-10-08 03:10:30","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2011-10-18T00:00:00-04:00","iso_date":"2011-10-18T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"related_links":[{"url":"http:\/\/www.scientificamerican.com\/podcast\/episode.cfm?id=cybersecurity-threats-to-pick-up-st-11-10-15","title":"http:\/\/www.scientificamerican.com\/podcast\/episode.cfm?..."}],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"654","name":"College of Computing"},{"id":"14781","name":"Cyber Threats Report"},{"id":"1404","name":"Cybersecurity"},{"id":"10567","name":"Georgia Tech Information Security Center"},{"id":"2254","name":"gtisc"},{"id":"2678","name":"information security"},{"id":"14782","name":"mobile phones"},{"id":"166941","name":"School of Computer Science"},{"id":"168927","name":"smartphones"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}