{"71655":{"#nid":"71655","#data":{"type":"news","title":"How iPhone Could Be Used as a Spy Phone","body":"","field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EWhat if a hacker could log every key you typed on your PC by placing a cellphone nearby? Patrick Traynor (\u003Cem\u003EComputer Science\u003C\/em\u003E) and colleagues have shown how this is possible using the latest generation of smartphones. \u003Cem\u003ESource: Times of India\u003C\/em\u003E\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":"","uid":"27174","created_gmt":"2011-10-20 11:36:29","changed_gmt":"2016-10-08 03:10:34","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2011-10-20T00:00:00-04:00","iso_date":"2011-10-20T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"related_links":[{"url":"http:\/\/timesofindia.indiatimes.com\/tech\/personal-tech\/computing\/How-iPhone-could-be-used-as-a-spy-phone\/articleshow\/10427292.cms","title":"http:\/\/timesofindia.indiatimes.com\/tech\/personal-tech\/computing\/How-iPhone-..."}],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"2678","name":"information security"},{"id":"9290","name":"iPhone"},{"id":"13274","name":"patrick traynor"},{"id":"166941","name":"School of Computer Science"},{"id":"168927","name":"smartphones"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}