How do Hackers Hack Cell Phones?