An attacker can gain control of another user's machine using an HTML-formatted e-mail with an attachment that contains a small remote-control program. The e-mail can be sent directly to the victim, or can be placed on a website.
Some iPod users are swapping jacks with strangers and finding new musical tastes. Should Apple add wireless broadcast and Rendezvous to the iPod so we can all tune in?
"Google's catalog search combs the pages of more than 600 current catalogs -- 1, 500 including back issues -- to help both consumers and corporations find everything from apple butter to zipper doodles."