There have been many articles about hackers exploiting a security hole or using some other method to gain unauthorized access to someone else's phone. This article reveals what really happens if your...