"Hackers look for big payoffs; they concentrate on accessing devices that have low levels of security but store important information," said Bob Egan, president of consulting firm Mobile Competency Inc..
Currently, cell phones fit that description. As cell phone usage has increased, so have their capabilities. These systems are no longer used simply for voice communications; increasingly, they support text messaging, email, Web surfing, and even video transmissions. As a result, users now use these devices to access important data, such as sales information or product delivery data.