Kyt Dotson
Latest from Kyt Dotson
BitMit.net Addresses the Need for a Bitcoin Oriented Auction Site
A new Internet auction house that the developers expect should mimic eBay with bitcoins has cropped up and it looks like business is growing. In a recent interview with BTCBase.com [German language] the lead for BitMit.net Auction House, Marius Falke talks about the challenges of accepting bitcoin for products and how it’s affected his business. ...
Kinect and Wii Used to Waldo a Nao Robot to Brush a Cat, Imagine What’s Next
In what some might call an unholy tandem, a Microsoft Kinect and Nintendo Wii have been hybridized together to permit a man—in this case software engineer Taylor Veltrop—to remotely brush his cat via 23-inch-tall robotic surrogate. To make this happen, Veltrop hacked together a Kinect, two Wiimotes, a head-mounted display (HMD) visor, a treadmill, and ...
Saudi Hackers Pilfer, Leak 400,000 Israeli Credit Card Accounts
Hackers are ringing in the new year with a lot of interesting declarations of financial cybermayhem—yesterday SiliconANGLE reported on 100 million Chinese usernames leaked—but today’s 400,000 records leak from Israel includes credit card information. A group of Saudi hackers hit several Israel-based web sites over the holiday and dumped the resulting information onto the Internet ...
100 Million Chinese Usernames, Passwords Leaked in Massive Hack Heist
China has been in the news recently being blamed for being the origin of various hacking attacks against the rest of the globe, but last week brings news of Chinese citizens themselves being targeted by hackers. A massive leak of 100 million Internet usernames, passwords, and e-mail addresses exfiltrated from dozens of China’s most popular ...
Facebook Offers Bug Bounty Hunters the White Hat Credit Card
It’s not uncommon for large corporations to put bounties on bugs in their software and to dole out hefty amounts of cash to security researchers who uncover them and then show the developer how to fix the problem. So when I read that Facebook had gone a step further with security bounty and released a ...
Security Trends of 2011: The Shadow of Anonymous and the Year of the Internet Hactivist
Every time there is a door, you need a lock because there’s a bad guy that wants to get in and the Internet is no different. Corporations generally sit on the leading edge of new technology and in this case cybersecurity with governments often being the worst, just above everyday individuals. Of course, corporations and ...
Google+ Surpasses 62 Million Users as Growth Continues to Accelerate
The advent of Google’s reply to social media outlets such as Facebook and Twitter, G+ has done extremely well since its launch. In fact, Paul Allen, founder of Ancestry.com who dubs himself the “unofficial statistician of G+” posted his observations on the ever-growing size of this social media juggernaut. According to Allen, he’s been having ...
Just in time for Christmas, Cloud Gaming Service OnLive Adds Xperia PLAY Support
If you happen to own one of these phones, you’re probably already an avid gamer so this little tidbit will probably fill your stockings with joy. Now a long-time pioneer of cloud-based gaming, OnLive announced on Thursday that they’re updating their free Android app to support the slide-out gamepad of the Xperia PLAY phone. The ...
Anonymous Hacks U.S. Security Think Tank Stratfor’s Christmas Stockings
Members of the Anonymous hactivist collective have come forward to claim that they raided U.S.-based security think tank Stratfor and stole the presents from beneath their Christmas tree—in the form of a database containing thousands of credit card numbers and other personal information belonging to clients. One hacker claimed that they intent was a sort ...
Rift Developer Trion Worlds Account Database Compromised
Last night, a carefully-worded e-mail went out to subscribers of Trion World’s massively multiplayer online role playing game, Rift announcing that the game developer’s user accounts had been compromised by hackers. The breadth and width of the breach is not currently known but it looks like the attackers stole a database containing pretty much basic ...









