A person manages to get access to a celebrity’s smartphone through an unsecured network and then sells pictures from the phone to the media. This is an example of: (1 point) Responses hacking. hacking. working. working. encrypting. encrypting. phishing.

hacking.