Kyt Dotson

Kyt Dotson is a Senior Editor at SiliconAngle and works to cover beats surrounding DevOps, security, gaming, and cutting edge technology. Before joining SiliconAngle, Kyt worked as a software engineer starting at Motorola in Q&A to eventually settle at Pets911.com where he helped build a vast database for pet adoption and a lost and found system. Kyt is a published author who writes science fiction and fantasy works that incorporate ideas from modern-day technological innovation and explore the outcome of living with those technologies.

Latest from Kyt Dotson

Google’s Malware Detection System Could be So Much More

Why is malware such a big problem currently? It can be summed up in a very simple set of terms about the human attention span: education and trust. Google represents an excellent vendor to deliver both of these. They have the network, they have the eyeballs, they’re well known, and they could even forge relationships ...

FBI Executes Search Warrants in New York Seeking Anonymous Suspects

Early Tuesday morning, the FBI executed search warrants on three homes in the New York area belonging to suspected members of Anonymous. Including the home of Giordani Jordan, which they hit at 6 a.m. EST with a search warrant for computers and computer related peripherals—an article on Foxnews.com mentions that agents removed at least one ...

Salesforce.com Chief Scientist JP Rangaswami On Filling Buisiness Gaps with Games

As an anthropologist, it’s easy for me to see how people generate rituals and rules in their everyday interactions to encourage or hinder particular behaviors—essentially, we’re aware of our own psychology and sometimes we end up finding ways to game it. Point-in-fact, that’s exactly what “gamification” happens to be: making things that aren’t otherwise games ...

Pentagon Officials Announce Breach of over 24,000 Files In Recent Cyberattack

In what will probably just be seen alongside this year’s string of high-visibility hacks against U.S. government targets, a top Pentagon official acknowledged Thursday that the Department of Defense has suffered one of the most damaging cyberattacks in its history. Deputy Defense Secretary William J. Lynn III disclosed that over 24,000 files had been lost ...

BitTrust API Seeks to Open a Generation of Apps for Bitcoin

Bitcoin (BTC) has continued to rise from an esoteric cryptocurrency known only to geeks and enthusiasts into a media sensation. Of the major hurdles to its eventual adoption as a digital currency have been the lack of involvement in technology—especially that of mobile. Recently, however, much of that has been changing with the advent of ...

Law Enforcement Seeks Legislation Requiring Providers to Keep Logs for 18 Months

Law enforcement representatives plan to endorse proposed legislation that will force communication providers—Internet Service Providers (ISPs), telecom and cable companies—to retain their customers’ logs for 18 months. The mandatory data retention bill is in hearing today before the U.S. House of Representatives. The would-be bill has not yet been drafted or presented, but it is ...

Department of Justice: Should the Government Compel People to Decrypt their Data?

In the digital era, access to files and sensitive data—especially that stored in the cloud—means that there’s always eyeballs on our information. As a result, a multitude of different storage techniques to protect our privacy from prying eyes, foreign and domestic, have arisen. Most of these techniques involve a digital variation of the lock and ...

Turkey Hit by Further Anonymous Hacks and Data Leaks

Turkey is a favorite target for the Anonymous hactivist collective due to the anti-censorship skein running through their tapestry of political activism. The country has been caught up in numerous problems involving suppression of dissent, cutting off the Internet to its citizens in the name of “protecting them”, and other obviously oppressive information withholding behaviors. ...

Cybersecurity Scholar Warns How Private E-mail in the Cloud Isn’t So Private After All

If you watch way too much Law & Order, CSI:, and other crime shows on TV like I do you’ve already encountered numerous story lines that hinge on investigators getting their hands on a person’s private e-mail or online browser history (not just what’s on their computer.) The emergence of these themes in police-blotter fiction ...

Fully Functional Bitcoin Wallet Comes to Android

We’ve been following the saga of this peer-to-peer cryptocurrency for a while now. Bitcoins have found themselves in the media recently, and had their share of ups-and-downs, adoption as a currency has been low in real world marketplaces. That said, the key to retail markets embracing bitcoins isn’t just going to be showing an interest ...