<node id="71524">
  <nid>71524</nid>
  <type>news</type>
  <uid>
    <user id="27174"><![CDATA[27174]]></user>
  </uid>
  <created>1318936146</created>
  <changed>1475896230</changed>
  <title><![CDATA[Cybersecurity Threats to Pick Up Steam in 2012]]></title>
  <body><![CDATA[]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2011-10-18T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>So many people use smartphones to surf the Web and store sensitive data, they've become a prime target for hackers, says the 2012 Emerging Cyber Threats Report, issued last week at the Georgia Tech Cyber Security Summit. <em>Source: Scientific American</em></p>]]></value>
    </item>
  </field_summary>
  <field_media>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
      </og_groups_both>
  <field_categories>
      </field_categories>
  <core_research_areas>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
          <link>
      <url>http://www.scientificamerican.com/podcast/episode.cfm?id=cybersecurity-threats-to-pick-up-st-11-10-15</url>
      <title></title>
      </link>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>654</tid>
        <value><![CDATA[College of Computing]]></value>
      </item>
          <item>
        <tid>14781</tid>
        <value><![CDATA[Cyber Threats Report]]></value>
      </item>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
          <item>
        <tid>10567</tid>
        <value><![CDATA[Georgia Tech Information Security Center]]></value>
      </item>
          <item>
        <tid>2254</tid>
        <value><![CDATA[gtisc]]></value>
      </item>
          <item>
        <tid>2678</tid>
        <value><![CDATA[information security]]></value>
      </item>
          <item>
        <tid>14782</tid>
        <value><![CDATA[mobile phones]]></value>
      </item>
          <item>
        <tid>166941</tid>
        <value><![CDATA[School of Computer Science]]></value>
      </item>
          <item>
        <tid>168927</tid>
        <value><![CDATA[smartphones]]></value>
      </item>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
