How to hack a phone:  common attack methods