A person manages to get access to a celebrity’s smartphone through an unsecured network and then sells pictures from the phone to the media. This is an example of:

hacking.

worming.

encrypting.

phishing.

hacking.