Feed Attackers exploit zero-day Windows flaw (com.com)
Attackers take advantage of vulnerability in Windows animated cursor. Also: Trojan spam dupes users into thinking it's an IE 7 beta.
Any circuit design must contain at least one part which is obsolete, two parts which are unobtainable, and three parts which are still under development.