The tricks most used by the cybercriminals to enter a phone