<node id="216131">
  <nid>216131</nid>
  <type>external_news</type>
  <uid>
    <user id="27556"><![CDATA[27556]]></user>
  </uid>
  <created>1370259068</created>
  <changed>1475893589</changed>
  <title><![CDATA[They Can Hack Your iPhone with a Malicious Charger]]></title>
  <body><![CDATA[<p>At the upcoming Black Hat security conference in late July, three researchers at the Georgia Institute of Technology plan to show off a proof-of-concept charger that they say can be used to invisibly install malware on a device running the latest version of Apple’s iOS. <em>Source: Forbes</em></p><p>&nbsp;</p>]]></body>
  <field_article_url>
    <item>
      <url><![CDATA[http://www.forbes.com/sites/andygreenberg/2013/06/02/researchers-say-they-can-hack-your-iphone-with-a-malicious-charger/]]></url>
      <title><![CDATA[]]></title>
    </item>
  </field_article_url>
  <field_publication>
    <item>
      <value><![CDATA[ Kausik Chakrabarti ]]></value>
    </item>
  </field_publication>
  <field_dateline>
    <item>
      <value>2013-06-03</value>
      <timezone></timezone>
    </item>
  </field_dateline>
  <field_media>
        </field_media>
  <og_groups>
          <item>47223</item>
          <item>50875</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[School of Computer Science]]></item>
      </og_groups_both>
    <field_userdata><![CDATA[]]></field_userdata>
</node>
