Inevitably, the source code for the ikee worm I mentioned in a previous blog (http://www.eset.com/threat-center/blog/2009/11/10/iworm-ikee-sex-and-drugs-and-rick-and-roll) has crept back out from under its rock.
It's probably equally inevitable that there'll be more script-kiddy attempts to produce variants and it will be easier for heavy-duty malware creators to produce new malware using similar techniques, if they're so-minded.
If you have a jailbroken iPhone, now would be a good time to make sure that you've reset the passwords for the root and mobile accounts. See http://cydia.saurik.com/password.html for details on how to do this.
David Harley BA CISSP FBCS CITP
Director of Malware Intelligence
ESET Threatblog (TinyURL with preview enabled): http://preview.tinyurl.com/esetblog
ESET Threatblog notifications on Twitter: http://twitter.com/esetresearch
ESET White Papers Page: http://www.eset.com/download/whitepapers.php
Securing Our eCity community initiative: http://www.securingourecity.org/
Author David Harley, ESET