iOS has vulnerabilities that allow for remote hacking of devices, including the iPhone. Programming-based hacking is the most difficult to carry out, thus it is more probable that it will be hacked via malicious software or physical access. However, it is possible that it will be hacked.