Hackers shift focus from computers to phones and other mobile devices