Best of the blogs: Some headlines are just too juicy to resist. Take, for instance, this one: The open source download heist . In this particular case the charge is inflating download numbers with intent to flaunt. “I’d actually suggest that a useful metric would be dollars-per-download,” Matt Asay espouses. “It’s not a good way of measuring community, but it is a very good way of measuring how much the buying community values one’s software.” Columnist’s corner: It wasn’t simple, no, but Oliver Rist isn’t easily daunted either. This time he wound his way, via persistence, to the confusing truth about Microsoft’s VoIP plans. The “longer answers stated that Response Point is entirely its own product, not related either by marketing or technology to OCS … yet.” So what exactly is it? “A full-featured VoIP PBX for which Microsoft produces the software and various hardware partners offer as an appliance.” Security: Cyber criminals are getting more specific by making malware outlets that uncover people’s computing posture in the effort to personalize attacks, according to IBM’s ISS group. Web attacks get personal. Such attacks frequently wait until a user opens a specific site or application before springing to life and beginning to intercept users’ details, ISS explains. Related: Hackers dodge the law via private IM. The news beat: LG Electronics reveals plans for some 10 cell phones boasting pre-installed Google software and services, namely Gmail, Maps and Blogger Mobile. Microsoft and Nortel extend their existing partnership on unified communications to focus on service providers and carriers. And IBM, Oracle and a raft of other vendors form the Service Research and Innovation (SRI) group to elevate service science to the level of computer science. Technology Industry