Cyber Security Articles & News

NEW CARTOON: How Kevin Mitnick Stole the Source Code for the Best Cell Phone of 1992

While on the run from the feds, Kevin Mitnick stole the source code of the Motorola MicroTAC Ultralite, the most advanced cellphone at the time, with a few phone calls.

n 1992, Kevin Mitnick was on the run from the cops, one of the most wanted men in the United States, and certainly the most wanted hacker. He was living in Denver under a pseudonym, and was very worried about government surveillance.

To avoid it, he thought it’d be a good idea to hack the Motorola MicroTAC Ultralite, the iPhone X of the 1990s. His plan was to try changing the identifying data on the phone, or even turn off the ability for cellphone towers to connect to it and, thus, give the cops his location.

That’s when he made “the stupid and regrettable decision” to go after the phone’s source code. The rest, as they say, is history—hacking history to be precise.

We sat down with Mitnick, who told us how he stole the source that source code just using social engineering over the phone for the latest episode of Greatest Moments in Hacking History, our series on the most famous and influential hacks in the history of information security.

Watch the episode here.

Source: MOTHERBOARD

Topics: Social Engineering, GMIHH, government surveillance, TAR, Denver, GZiP, hackers, hacking, keynote speaker, INFOSEC, LINUX, source code, cell phone, Hacking History, identifying data, information security, Kevin Mitnick, Motorola MicroTAC Ultralite

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

5 Holiday Cybersecurity Tips To Prepare Your Organization

Protecting your organization from outside threats should always be a top priority. However, you may need to shore up your security as we approach the ..

Read more ›

Spear Phishing vs Phishing: Recognizing the Difference

Since the dawn of the internet, there have been threat actors looking to exploit systems, steal data, and compromise the integrity and reputation of p..

Read more ›

Kevin Mitnick Security Awareness Training: Microsoft Teams

Kevin Mitnick — founder of Mitnick Security and Knowbe4’s Chief Hacking Officer — helps organizations find and remediate vulnerabilities through penet..

Read more ›
tech-texture-bg