Hackers know mobile devices are treasure troves of information, so the attempts to access that information won't likely stop.