The charger is a mini linux machine what needs to use an apple developer account to dynamically add the devices UDID to the developer portal. It then signs the malicious app and installs it. It takes advantage of ad-hoc distribution and would require a new Apple developer account every 100 devices.
Everything that Ernest said, plus one more important note: Your phone must be either unlocked or not passcode/password protected, in order for this exploit to function. (Just another good reason to use what should be common sense security precautions, really.)
First, I will preface my comment by saying that I am not actually in favor of government regulation of the internet... but if we were to actually go down that road, I would opine that the only step necessary to dramatically improve US broadband, would be to incorporate salary caps into the C- level positions at the existing telcos. If the money can't be siphoned up the chain to the bank account of those money-hungry CEOs, then it seems to me that the most likely places for all that cash to go would be a) back into the company, (as in, both the lower level employees and the infrastructure) or b) back to the customers and stockholders.
I mean, I'm all for a free market and the capitalistic system and all that... but good grief! Salaries at the top are positively obscene!
Personally, in your situation I would probably recommend going full tilt into the formal Agile process. Strictly speaking, the formalized definition of the "Agile process" does not necessarily coincide with what most people think of as "agile". In an "agile" world, maybe you can make changes at a whim, simply because the customer says jump... but in the "Agile process", you don't really make changes to the current sprint; all changes get dropped into the product backlog, and prioritized appropriately to be included in a future sprint. If you're changing the scope of tasks included in the current sprint, then you're not really doing Agile.
Mind you, there are infrequent times when a new requirement or a bug report might actually trumps the sprint altogether... personally, I would classify those as emergencies. And let's be frank: How many actual emergencies do you think take place in the world of computer programming?
(Source: My employer sent me to ScrumMaster training a couple of weeks ago.)
As far as the laws of mathematics refer to reality, they are not certain, and as far as they are certain, they do not refer to reality. -- Albert Einstein