Smartphones have become precious prey for hackers in recent years, and the dramatic increase in targeting of these devices can be linked to the realization of “cyber thieves” that there are more than 6 billion people in the world, who rely on these phones to store their own information, such as bank data, email accounts and other sensitive data, which may be linked to personal photos or videosDespite attempts by phone system manufacturers to protect users, “internet thieves” continue to devise ways to make the task of “preventing hacking” almost impossible.Internet thieves of all categories do the impossible to hack the phone to access information related to bank accounts, or any video, photo, personal message or password, which they can exploit to turn its owner into a financially profitable target," technology expert Mazen Dhakash says in an interview.He points out that "internet thieves cannot be limited to one type, as they belong to various groups that meet at the sole goal, which is to achieve financial profit, through methods ranging from extortion and up to controlling data that allow them to access individual bank accounts."According to Dakash, “the process of thieves hacking a smartphone can be carried out in countless ways, including infecting the phone with viruses through certain applications, or through phishing via text messages, voice messages and even phone calls.”Thieves can also resort to the trick of offering free Wi-Fi in a public place, giving them access to information they can exploit,” he adds.For his part, Mohammed Al-Rashidi, head of the Cybersecurity Committee at the Kuwait Electronic Media Union, tells Sky News Arabia that "Internet thieves are always looking for the most used devices, so it makes sense to turn towards smartphones, which have become valuable information that makes them a valuable catch."He points out that "the most serious types of penetrations that are happening now are (social engineering) penetrations that are carried out by following a specific person, and searching for the closest people to him and the places he frequents, based on the information available on the Internet, and then the process of entraping the victim begins by delusion that the person he is talking to