Let's go into what "bricking" means today and in SR5.
Today, an iPhone is a brick, if I mess around with its firmware (e.g. for using a jailbreak) and something goes wrong in such a way that it won't start. Unusable, but potentially recoverable with the right amount of fiddling and know-how (i.e. resetting the firmware and starting from scratch).
In SR5, the brick is for some reason (rule of debatable cool?) a flaming brick. The iLink explodes or sparks spectacularly before becoming unusable, forever, due to hardware failures following a software attack.
Now, it theoretically IS possible for a software viral attack to damage hardware components. It has happened before, but is so rare that it's basically all proof-of-concept work, and requires to ignore several hardware failsafes.
If you want more information on that, look e.g. here:
https://www.kaspersky.com/blog/fact-or-fict...-hardware/9705/ This article is from 2015, and shortly after there was a rise in ransomware that even infected computers on the boot level. But again, this is not a hardware failure, and can be remedied by flashing the BIOS with the proper know-how.
Burning Samsung phones aren't really a software issue either, and they don't explode from a viral attack.
Even remote hacking a jeep doesn't immediately follow up with hardware damage, but this is only possible if you drive it remotely into an obstacle, which isn't bricking it (although a bricking here would likely have a similar result if it happens during travel), but rather taking it over and "rigging" it.
I won't even go into burning cyberware in your spinal cord. That horse has been beaten to death and beyond before.
In SR4, as has been stated, a filled matrix condition monitor means a reboot. You could argue that this is a bit cheap for all that hacker's effort, but it basically means that the device is out of the picture for a while. For detailed rules, see p. 238 in the SR4 core rule book.
Personally, I find the SR4 solution both more realistic and less hard on the runner's wallets. I'd argue that software failsafes can be used by just about anyone in the even more technological world of 207x, and are built-in as safety and security measures.