Yet Another Bitcoin Bank Goes Bust

Yet Another Bitcoin Bank Goes Bust

Cloud News Round Up March 5th

bitcoin-bankrupt

Canadian Bitcoin Bank ‘Flexcoin’ Shuts Down After $600,000 Theft – The digital storage of things doesn’t just offer problems for data, as cloud-based cryto-currencies (a peer-to-peer digital currency that relies on cryptography) can also be built on shaky ground without the right security measures. As Bitcoin, a crypto-currency, is based in the ether and isn’t a physical form of money, it can be stolen or hacked away, just as it was recently with Canadian Bitcoin bank, Flexcoin, who have seen $600,000 worth of Bitcoins stolen. All of the coins in Flexcoin’s ‘hot wallet’ (funds that are connected to the Internet) were taken and as Flexcoin say that they do not “have the resources, assets, or otherwise to come back from this loss”, the bank will be closing down, raising further questions about Bitcoin’s future and the security it offers its users.

Security Firm Elastica Announces Funding – A key problem with embracing SaaS technology, particularly in this era of BYOD (Bring Your Own Device) is that there are an incredible amount of security risks posed by large amounts of employees having access to company data. This is a problem that Elastica would like to solve, with the SaaS security firm being in stealth mode for quite a while as they worked on their offering. However, they are now out in the public and have now announced funding, with the company securing $6.3 million in venture funding from Mayfield Fund. Rehan Jalil, the President and Chief Executive Officer of Elastica explains that “[They] are focused on enabling the elastic enterprise , where companies can achieve business agility, collaborative capability and cost efficiencies to effectively compete in today’s market,” which Elastica help with “by harnessing advanced data science and machine learning”.

Opower Files for $100 Million IPO – Utility SaaS provider Opower provides customer engagement solutions for the utility industry, working since its founding in 2007 to do so. Cloud technology is big business and big business means that there’s plenty of money to be both invested and raised and having made $89 million in sales for the fiscal year that ended December 31, 2013, it perhaps signals exactly why Opower have now made a filing with the SEC (Securities and Exchange Commission) to raise up to $100 million in an IPO (initial public offering). There’s no word on when shares will become available to buy but it has been revealed that Opower plans to list on the NYSE (New York Stock Exchange) under the symbol ‘OPWR’.

By Jennifer Livingstone

(Image Source: Shutterstock)

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

One Response to Yet Another Bitcoin Bank Goes Bust

  1. It’s very important for anyone dealing with cryptocurrency to hold their own private keys. It is always a security risk to store large amounts in another person or business’s control.

    If you’re trading, only keep a fraction of your holdings in the exchange. Even better for security is to trade peer to peer. The whole underlying concept of crypto is the core principle of decentraliztion and the first effective, workinng, TRUSTLESS economy.

    The best ways to store your own private keys are paper wallets and/or cold (offline) storage. You can print out a private/public key and have it never touch the internet, therefore never accessible to anyone who does not have physical access to the paper. Or you can create a private/public key file using a computer that is offline and send the Bitcoin to that address. Put that file on a USB flash drive and nobody can ever touch it without physical access to the device.
    The most hardcore option is to create a brain wallet (same concept as a paper wallet). One that only exists in your memory.

    Your control, your keys = your money. Not your control, not your keys = not your money.

Comic
When Sci-Fi Predictions Come To Fruition

When Sci-Fi Predictions Come To Fruition

Evolution of Technologies To paraphrase science fiction author Arthur C. Clark, those who make predictions about the future are either “considered conservative now and mocked later, or mocked now and proved right when they are no longer around to enjoy the acclaim.” The one thing we can be sure about, Clark ventured, is that “[the…

Facebook Hopes To Extend Internet Connectivity With Solar-Powered Drones

Facebook Hopes To Extend Internet Connectivity With Solar-Powered Drones

Facebook Inc (FB.O) said on Thursday it had completed a successful test flight of a solar-powered drone that it hopes will help it extend internet connectivity to every corner of the planet. Aquila, Facebook’s lightweight, high-altitude aircraft, flew at a few thousand feet for 96 minutes in Yuma, Arizona, Chief Executive Mark Zuckerberg wrote in…

When Will Women In Tech Become The Norm?

When Will Women In Tech Become The Norm?

Tech Diversity It is well known that the technology industry has been dominated by men, but it is also clear that the industry is working to change that. Diversity in the tech industry, especially where it applies to women in tech, has been a topic of discussion for years. Recently the Washington Technology Industry Association…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

Edtech and Virtual Reality – Exciting Learning Environment

Edtech and Virtual Reality – Exciting Learning Environment

Customizing Edutech Customized edtech learning solutions are becoming more commonplace as the education industry recognises their potential and begins transforming the traditional structures so as to incorporate innovative developments. From textbooks to tablets, chalkboards to virtual reality, edtech promises not only dynamic and exciting learning environments but better learning strategies and solutions. Virtual Reality and…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Get Ready For Virtual Reality and the Cloud

Get Ready For Virtual Reality and the Cloud

Virtual Reality Cloud We’re lucky to live in an era where virtual reality is no longer relegated to the confines of a sci-fi movie universe. Thanks to technology introduced by products like Oculus Rift, consumers now have access to virtual environments with fully immersive graphic capabilities. As a result, companies have only just begun to…

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology Profiling 600 companies and including 553 supporting tables and figures, recent reports into the M2M, IoT and Wearable Technology ecosystems forecast opportunities, challenges, strategies, and industry verticals for the sectors from 2015 to 2030. With many service providers looking for new ways to fit wearable technology with their M2M offerings…

The Cloud Above Our Home

The Cloud Above Our Home

Our Home – Moving All Things Into The Cloud The promise of a smart home had excited the imagination of the movie makers long ago. If you have seen any TV shows in the nineties or before, the interpretation presented itself to us as a computerized personal assistant or a robot housekeeper. It was smart,…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth The Internet of Things is the latest term to describe the interconnectivity of all our devices and home appliances. The goal of the internet of things is to create universal applications that are connected to all of the lights, TVs, door locks, air conditioning, and…

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of sports teams to improving science and research, even helping to aid law enforcement. Amazon Web…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…