Well the double spend has happened on one of the exchanges with a scamcoin (not sure which one). As I mentioned before the scamcoins have had their uses - one being to show actual attempts (and success) at attacking the network.
Not all attacks are the same and only 1 is prevented (somewhat) by a shorter block. There are essentially 4 methods to defraud a block chain based currency:
1) "the 51% attack"
This is the big one (and the method used to defraud the exchanges). Start work on a block chain in private (the attack chain). Exploit a irreversible transaction (like deposit to exchange, trade, withdraw in another currency). Now include an alternate version in your attack chain. When your attack chain is longer than the "legit chain" (which is inevitable if you have 51% of hashing power) broadcast your alternate chain. The deposit to the exchange "disappears". You keep the money and have equivalent value in an alternate currency. Doubled your money and exchange loses the value of the deposit.
Countermeasures:
Actively looking for a double spend: FAIL (can't be detected)
Waiting for 1 confirmation: FAIL (block will be reversed)
Waiting for 6+ confirms: FAIL (block will be reversed)
Ensuring no attacker has 51% of network: PASS
2) The confirmed double spend.
With less than 51% hashing power you eventually will fall behind the legit chain (exact opposite of 51% attack). However you may be able to reverse confirmations. It requires some luck and significant fraction of hashing power (10% to 30%+). The longer the confirmation chain the less likely you will be able to reverse the chain. It is to prevent this attack (not 51% attack that we recommend 6+ confirms). Satoshi paper does some analysis on how difficult it is to reverse transactions depending on how buried they are in the
Countermeasures:
Actively looking for a double spend: FAIL (can't be detected)
Waiting for 1 confirmation: FAIL (although still difficult as it requires massive hashing power)
Waiting for 6+ confirms: PASS (Increasingly improbable you can be defrauded as # of confirms increase)
Ensuring no attacker has 51% of network: N/A
3) The Finney Attack
Attacker includes a transaction in a block he is mining (like transferring coins from himself to himself). When he solves a block he spends those same coins in an alternate transaction and then publishes the block. Since his transaction is already in the block it wins and the double spent merchant loses. The opportunity for this attack is based on hashing power. An attacker w/ 1% of global hashing power will have a 1% chance of pulling off the attack on each block. This is the most "dangerous" of the attacks because it is theoretically plausible to pull off and will have no warning. However it is unlikely it would be used on trivial purchases simply due to the cost. Merchants need to evaluate if they are a potential target. Those who aren't can accept 0-confirm transactions and those who are should wait for 1-confirm.
Countermeasures:
Actively looking for a double spend: FAIL (can't be detected)
Waiting for 1 confirmation: PASS (highly improbable attacker can get 2+ confirms)
Waiting for 6+ confirms: Not necessary but ultra cautious merchants could wait for 2+ confirms.
Ensuring no attacker has 51% of network: N/A
3) The 0-confirm double spend
Attacker submits 2 transactions for same coins to the network. If merchant is actively looking for double spends this is almost impossible to pull off. Merchant could simply wait for transaction to arrive not from customer/attacker but from one of its remote peers (indicating transaction has propagated the network). Merchant can make this more difficult by waiting for multiple confirmations and waiting say 60 seconds to see if any alternate transaction is seen.
Countermeasures:
Actively looking for a double spend: PASS (can be detected and avoided)
Waiting for 1 confirmation: Not necessary however merchants should evaluate the value of their goods & services
Waiting for 6+ confirms: Not necessary however merchants should evaluate the value of their goods & services
Ensuring no attacker has 51% of network: N/A
So as you can see a shorter block really doesn't prevent any of the attack scenarios. A 2 minute block isn't short enough to make real time confirmations and thus merchants will need to learn to defend against 0-confirm attacks. A 2 minute block does prevent Finney attack but only if merchant is willing/able to wait 2+ minutes. Very few transactions are vulnerable to this type of attack thus the value of making a breaking change seems inconclusive.