W32.SirCam.Worm@mm is still the most common virus spreading in email. An important point to remember is that it includes a random document from the victim's desktop when sending itself, therefore, it may be revealing confidential documents. Also, the attached document might be very large and some uninfected users have effectively been DOS'ed because they have received so many large documents from victims. Because SirCam searches the victim's Temporary Internet Files for email addresses, this is likely to affect people whose email address is listed on popular sites. Code Red has also continued to spread. Although the original variant is less common now, two new variants have been spreading. They exploit the same vulnerability as the original, and can be stopped by the same patch: Microsoft Security Bulletin MS01-033
Some people have asked if anti-virus software can detect Code Red, the answer is not straightforward. Anti-Virus (AV) software searches files, but Code Red only exists as a process in memory and an exploit in an http session. Therefore, AV software does not detect it directly. Intrusion Detection (IDS) software can be configured to detect the http sessions.
However, Code Red II does write a Trojan to the disk of the infected machine, which AV software can detect, for example, Symantec says, "Norton AntiVirus is able to detect an infection on the Web server by detecting the payload (Trojan component) of this worm as Trojan.VirtualRoot."