<node id="71914">
  <nid>71914</nid>
  <type>external_news</type>
  <uid>
    <user id="27174"><![CDATA[27174]]></user>
  </uid>
  <created>1319560557</created>
  <changed>1475893509</changed>
  <title><![CDATA[Researchers Can Keylog Your PC Using Your iPhone's Accelerometer]]></title>
  <body><![CDATA[<p>Similar keylogging methods have been developed using a smartphone's microphone, but malware masquerading as a legitimate app can usually access a smartphone's accelerometer without tripping built-in security features, according to researcher Patrick Traynor (<em>Computer Science</em>) and colleagues. <em>Source: Ars Technica</em></p>]]></body>
  <field_article_url>
    <item>
      <url><![CDATA[http://arstechnica.com/apple/news/2011/10/researchers-can-keylog-your-pc-using-your-iphones-accelerometer.ars?utm_campaign=rss&amp;utm_medium=rss&amp;utm_source=rss]]></url>
      <title><![CDATA[]]></title>
    </item>
  </field_article_url>
  <field_publication>
    <item>
      <value><![CDATA[ trauma recall ]]></value>
    </item>
  </field_publication>
  <field_dateline>
    <item>
      <value>2011-10-20</value>
      <timezone></timezone>
    </item>
  </field_dateline>
  <field_media>
        </field_media>
  <og_groups>
          <item>47223</item>
          <item>50875</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[School of Computer Science]]></item>
      </og_groups_both>
    <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
