NEW CARTOON: How Kevin Mitnick Stole the Source Code for the Best Cell Phone of 1992

While on the run from the feds, Kevin Mitnick stole the source code of the Motorola MicroTAC Ultralite, the most advanced cellphone at the time, with a few phone calls.

n 1992, Kevin Mitnick was on the run from the cops, one of the most wanted men in the United States, and certainly the most wanted hacker. He was living in Denver under a pseudonym, and was very worried about government surveillance.

To avoid it, he thought it’d be a good idea to hack the Motorola MicroTAC Ultralite, the iPhone X of the 1990s. His plan was to try changing the identifying data on the phone, or even turn off the ability for cellphone towers to connect to it and, thus, give the cops his location.

That’s when he made “the stupid and regrettable decision” to go after the phone’s source code. The rest, as they say, is history—hacking history to be precise.

We sat down with Mitnick, who told us how he stole the source that source code just using social engineering over the phone for the latest episode of Greatest Moments in Hacking History, our series on the most famous and influential hacks in the history of information security.

Watch the episode here.

Source: MOTHERBOARD

Topics: Social Engineering, GMIHH, government surveillance, TAR, Denver, GZiP, hackers, hacking, keynote speaker, INFOSEC, LINUX, source code, cell phone, Hacking History, identifying data, information security, Kevin Mitnick, Motorola MicroTAC Ultralite

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Remote Security: 5 Cyber Security Tips for Employees and Businesses

By 2025, 32.6 million Americans are estimated to work remotely. Additionally, 73% of executives believe employees who work remotely present more cyber..

Read more ›

How Long Will It Take To Recoup From a Data Breach?

While many think of the steps needed to avoid a data breach, it’s equally important to think about the steps your business would need to take in the w..

Read more ›

Ransomware Attacks: Trends and Most Targeted Industries

With the rise of worldwide ransomware attacks, 2024 is the perfect time to understand why these current cyber threats are happening and how to safegua..

Read more ›
tech-texture-bg