Cyber Security Articles & News

NEW CARTOON: How Kevin Mitnick Stole the Source Code for the Best Cell Phone of 1992

While on the run from the feds, Kevin Mitnick stole the source code of the Motorola MicroTAC Ultralite, the most advanced cellphone at the time, with a few phone calls.

n 1992, Kevin Mitnick was on the run from the cops, one of the most wanted men in the United States, and certainly the most wanted hacker. He was living in Denver under a pseudonym, and was very worried about government surveillance.

To avoid it, he thought it’d be a good idea to hack the Motorola MicroTAC Ultralite, the iPhone X of the 1990s. His plan was to try changing the identifying data on the phone, or even turn off the ability for cellphone towers to connect to it and, thus, give the cops his location.

That’s when he made “the stupid and regrettable decision” to go after the phone’s source code. The rest, as they say, is history—hacking history to be precise.

We sat down with Mitnick, who told us how he stole the source that source code just using social engineering over the phone for the latest episode of Greatest Moments in Hacking History, our series on the most famous and influential hacks in the history of information security.

Watch the episode here.

Source: MOTHERBOARD

Topics: Social Engineering, GMIHH, government surveillance, TAR, Denver, GZiP, hackers, hacking, keynote speaker, INFOSEC, LINUX, source code, cell phone, Hacking History, identifying data, information security, Kevin Mitnick, Motorola MicroTAC Ultralite

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Year in Review: What We Learned Speaking at Virtual Cyber Security Events in 2020

Here we are: another year in the books. Twenty twenty however, has been one unlike any other… to say the least!

Read more ›

5 Tips for Choosing a Cyber Security Speaker for a Lead Gen Webinar

The right speaker for your cybersecurity webinar can help you capture higher-quality leads by building trust between your audience and your company. O..

Read more ›

Disinformation, The Election & Cybersecurity

During this election season, disinformation campaigns have been so prevalent that the NY Times has a live-updating feed of the latest falsehoods and m..

Read more ›
tech-texture-bg