Filled with delicate information and accessible from wherever, cellular apps are each hacker’s dream.