Researchers Discover Vulnerability in Widely-Used Method for Securing Phone Data