Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Phone Worm Source Code Out, Expect More Threats: Page 3 of 3

The new versions, on the other hand, can spread to an unlimited number of devices per reboot of the infected phone.

"As soon as a suitable target phone is seen, the worm sends itself and keeps sending itself to that phone while it is still in range," continued F-Secure. "Once the target phone leaves the area, Cabir.h and Cabir.i find a new target and continue spreading. In conditions where people move around and new phones come in contact with each other, Cabir.h and Cabir.i can spread rapidly."

While smart phones and handhelds have gotten away relatively unscathed in 2004, that probably won't continue, security firms have predicted.

"The increasing number of attacks shows that there's an interest building out there among the hacker community," said Symantec's Vincent Weafer in an interview last week. "As e-commerce becomes a bigger part of what people do with smart phones, so too will attacks."