Date: 11/10/05 (Security) Keywords: no keywords
Trojan horses use controversial tool from copy-protected albums to hide on hard drives and take over computers.
Source: http://news.zdnet.com/2100-1009_22-5944643.html