Did dolphins really need to be brought into cybersecurity debate? 

Regardless of what technique hackers use (ultrasonic in this instance) to compromise user's handsets, private and public sector organisations need to stop focussing on the device and focus on the user's behaviour.

Monitoring for changes in behaviour might be a better strategy than simply assuming the device is being used by the rightful user.