<node id="71277">
  <nid>71277</nid>
  <type>news</type>
  <uid>
    <user id="27174"><![CDATA[27174]]></user>
  </uid>
  <created>1318589567</created>
  <changed>1475896226</changed>
  <title><![CDATA[New Cyber Threats Expected in 2012]]></title>
  <body><![CDATA[]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2011-10-14T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>Mobile devices will become an even more attractive target for cyber criminals in 2012, according to the 2012 Emerging Cyber Threats Report, issued during this week's Georgia Tech Cyber Security Summit. "You have to do your due diligence" before downloading mobile apps, says Mustaque Ahamad (<em>Computer Science</em>). <em>Source: WABE</em></p>]]></value>
    </item>
  </field_summary>
  <field_media>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
      </og_groups_both>
  <field_categories>
      </field_categories>
  <core_research_areas>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
          <link>
      <url>http://www.publicbroadcasting.net/wabe/news.newsmain/article/1/0/1862490/Atlanta./New.Cyber.Threats.Expected.in.2012</url>
      <title></title>
      </link>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>345</tid>
        <value><![CDATA[cyber security]]></value>
      </item>
          <item>
        <tid>14717</tid>
        <value><![CDATA[Emerging Cyber Threats Report]]></value>
      </item>
          <item>
        <tid>10567</tid>
        <value><![CDATA[Georgia Tech Information Security Center]]></value>
      </item>
          <item>
        <tid>2678</tid>
        <value><![CDATA[information security]]></value>
      </item>
          <item>
        <tid>12739</tid>
        <value><![CDATA[mobile devices]]></value>
      </item>
          <item>
        <tid>11017</tid>
        <value><![CDATA[Mustaque Ahamad]]></value>
      </item>
          <item>
        <tid>166941</tid>
        <value><![CDATA[School of Computer Science]]></value>
      </item>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
