Most smartphone hacks these days, even the most dangerous ones, require some sort of user interaction — tapping on a link, opening a message, installing an app — for the hacker to gain control of the device.
But a particularly nasty iPhone exploit (via Ars Technica)...