{"71928":{"#nid":"71928","#data":{"type":"external_news","title":"How iPhone Could Be Used as a Spy Phone","body":[{"value":"\u003Cp\u003EWhat if a hacker could log every key you typed on your PC by placing a cellphone nearby? Patrick Traynor (\u003Cem\u003EComputer Science\u003C\/em\u003E) and colleagues have shown how this is possible using the latest generation of smartphones. \u003Cem\u003ESource: Times of India\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27174","created_gmt":"2011-10-25 16:43:19","changed_gmt":"2016-10-08 02:25:09","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","publication":"K-12 InVenture Prize; CEISMC; STEM; invention; entrepreneurship; K-12 educaton","field_article_url":"","publication_url":"http:\/\/timesofindia.indiatimes.com\/tech\/personal-tech\/computing\/How-iPhone-could-be-used-as-a-spy-phone\/articleshow\/10427292.cms","dateline":{"date":"2011-10-20T00:00:00-04:00","iso_date":"2011-10-20T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"2678","name":"information security"},{"id":"9290","name":"iPhone"},{"id":"13274","name":"patrick traynor"},{"id":"166941","name":"School of Computer Science"},{"id":"168927","name":"smartphones"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}