Best of the blogs: After his post on open source spam solutions, Martin Heller heard from many readers, several of whom, including commercial anti-spam vendors, have offered to help. Then again, spammers are after him now more than ever. “The Heisenberg Principle is at work. I observed my spam situation, and now it has changed: spammers are targeting my personal domain, mheller.com, at an even higher level. It looks deliberate,” he reports in this Strategic Developer post. “Maybe they are trying a DDoS attack, in retaliation for the fact that I’m talking publicly about putting them out of business. They are [expletive deleted] morons. It’s barely a minor annoyance. I only mention it because there has been just enough of an uptick for me to notice.” The news beat: A security researcher warns that Apple’s iPhone could face security problems in the form of malware that leads users to Web pages that, in turn, can inject code into the device. JackBe unwraps Presto Wires, a mashup composer that functions with the company’s mashup server. An Intel executive says that the 3D Web and virtual worlds will take so much computing power that they might be “the killer app of killer apps.” And bugs in VMware highlight the security risks of running virtual computers on a single system. Notes from the field: It’s Friday and that means Cringe has a fresh geek week in review. This time, everybody must get stoned, suckers wanted, hell is for heroes, Steve Jobs vs. hackers. “Stoned dates from the era where viruses were mostly harmless — more of an acid flashback than an OD,” Cringe reports. Stoned, you see, is a 13-year old virus that a German laptop maker has been inadvertently distributing with Vista notebooks. Open source: While mobile Linux continues to gain traction, splintering threatens that momentum, at least according to officials at MontaVista. Confusion looms about goals for the OS’s future. And while there are a few consortiums at play, that may even make matters worse, some say. Also, operators don’t want introduce more Linux devices into their networks at the expense of escalating the interoperability problem. Security