Also, exploits can come in any shape or form, it’s not just about your internet browsing habits. You could be the safest internet/email user in the world, but still get exploited/hacked in other ways. There could be an exploit with the lightning port, or maybe someone sends you a well crafted message that involves no interaction, or an exploit via Bluetooth, etc.
These are a few past examples:
The end to a mystery that’s been around for years.
www.theverge.com
A journalist says a hacker was able to access his iPhone after sending him a text message — even though he never clicked on any links.
futurism.com
Research is largely theoretical but exposes an overlooked security issue.
arstechnica.com