This is a misleading thread title, largely no doubt due to the poor quality of the press coverage and the emphasis placed there on the use of a mobile phone in a demonstration. The vulnerabilities discussed by Hugo are very real and exist, but mobile phones are not a part of the potential attack vector, it just happened to be an interface he used for this demonstration.