{"71914":{"#nid":"71914","#data":{"type":"external_news","title":"Researchers Can Keylog Your PC Using Your iPhone\u0027s Accelerometer","body":[{"value":"\u003Cp\u003ESimilar keylogging methods have been developed using a smartphone\u0027s microphone, but malware masquerading as a legitimate app can usually access a smartphone\u0027s accelerometer without tripping built-in security features, according to researcher Patrick Traynor (\u003Cem\u003EComputer Science\u003C\/em\u003E) and colleagues. \u003Cem\u003ESource: Ars Technica\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27174","created_gmt":"2011-10-25 16:35:57","changed_gmt":"2016-10-08 02:25:09","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","publication":"trauma recall","field_article_url":"","publication_url":"http:\/\/arstechnica.com\/apple\/news\/2011\/10\/researchers-can-keylog-your-pc-using-your-iphones-accelerometer.ars?utm_campaign=rss\u0026utm_medium=rss\u0026utm_source=rss","dateline":{"date":"2011-10-20T00:00:00-04:00","iso_date":"2011-10-20T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"2678","name":"information security"},{"id":"9290","name":"iPhone"},{"id":"13274","name":"patrick traynor"},{"id":"166941","name":"School of Computer Science"},{"id":"168927","name":"smartphones"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}