NEW CARTOON: How Kevin Mitnick Stole the Source Code for the Best Cell Phone of 1992

While on the run from the feds, Kevin Mitnick stole the source code of the Motorola MicroTAC Ultralite, the most advanced cellphone at the time, with a few phone calls.

n 1992, Kevin Mitnick was on the run from the cops, one of the most wanted men in the United States, and certainly the most wanted hacker. He was living in Denver under a pseudonym, and was very worried about government surveillance.

To avoid it, he thought it’d be a good idea to hack the Motorola MicroTAC Ultralite, the iPhone X of the 1990s. His plan was to try changing the identifying data on the phone, or even turn off the ability for cellphone towers to connect to it and, thus, give the cops his location.

That’s when he made “the stupid and regrettable decision” to go after the phone’s source code. The rest, as they say, is history—hacking history to be precise.

We sat down with Mitnick, who told us how he stole the source that source code just using social engineering over the phone for the latest episode of Greatest Moments in Hacking History, our series on the most famous and influential hacks in the history of information security.

Watch the episode here.

Source: MOTHERBOARD

Topics: Social Engineering, GMIHH, government surveillance, TAR, Denver, GZiP, hackers, hacking, keynote speaker, INFOSEC, LINUX, source code, cell phone, Hacking History, identifying data, information security, Kevin Mitnick, Motorola MicroTAC Ultralite

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Spear Phishing & Targeted Email Scams: What You Need to Know About this Hacking Technique

Most companies tell their employees to be on the lookout for email scams, yet not all take the time to educate their team on what these malicious mess..

Read more ›

An Overview of the 2020 UHS Ransomware Attack

This past weekend, the Fortune 500 hospital and healthcare services provider Universal Health Services (UHS) fell victim to an immobilizing ransomware..

Read more ›

What is Penetration Testing?

A penetration test is a simulated cyber attack against your nonmalicious computer system to check for exploitable vulnerabilities. It’s a series of ta..

Read more ›
tech-texture-bg