Yet Another Bitcoin Bank Goes Bust

Yet Another Bitcoin Bank Goes Bust

Cloud News Round Up March 5th

bitcoin-bankrupt

Canadian Bitcoin Bank ‘Flexcoin’ Shuts Down After $600,000 Theft – The digital storage of things doesn’t just offer problems for data, as cloud-based cryto-currencies (a peer-to-peer digital currency that relies on cryptography) can also be built on shaky ground without the right security measures. As Bitcoin, a crypto-currency, is based in the ether and isn’t a physical form of money, it can be stolen or hacked away, just as it was recently with Canadian Bitcoin bank, Flexcoin, who have seen $600,000 worth of Bitcoins stolen. All of the coins in Flexcoin’s ‘hot wallet’ (funds that are connected to the Internet) were taken and as Flexcoin say that they do not “have the resources, assets, or otherwise to come back from this loss”, the bank will be closing down, raising further questions about Bitcoin’s future and the security it offers its users.

Security Firm Elastica Announces Funding – A key problem with embracing SaaS technology, particularly in this era of BYOD (Bring Your Own Device) is that there are an incredible amount of security risks posed by large amounts of employees having access to company data. This is a problem that Elastica would like to solve, with the SaaS security firm being in stealth mode for quite a while as they worked on their offering. However, they are now out in the public and have now announced funding, with the company securing $6.3 million in venture funding from Mayfield Fund. Rehan Jalil, the President and Chief Executive Officer of Elastica explains that “[They] are focused on enabling the elastic enterprise , where companies can achieve business agility, collaborative capability and cost efficiencies to effectively compete in today’s market,” which Elastica help with “by harnessing advanced data science and machine learning”.

Opower Files for $100 Million IPO – Utility SaaS provider Opower provides customer engagement solutions for the utility industry, working since its founding in 2007 to do so. Cloud technology is big business and big business means that there’s plenty of money to be both invested and raised and having made $89 million in sales for the fiscal year that ended December 31, 2013, it perhaps signals exactly why Opower have now made a filing with the SEC (Securities and Exchange Commission) to raise up to $100 million in an IPO (initial public offering). There’s no word on when shares will become available to buy but it has been revealed that Opower plans to list on the NYSE (New York Stock Exchange) under the symbol ‘OPWR’.

By Jennifer Livingstone

(Image Source: Shutterstock)

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

One Response to Yet Another Bitcoin Bank Goes Bust

  1. It’s very important for anyone dealing with cryptocurrency to hold their own private keys. It is always a security risk to store large amounts in another person or business’s control.

    If you’re trading, only keep a fraction of your holdings in the exchange. Even better for security is to trade peer to peer. The whole underlying concept of crypto is the core principle of decentraliztion and the first effective, workinng, TRUSTLESS economy.

    The best ways to store your own private keys are paper wallets and/or cold (offline) storage. You can print out a private/public key and have it never touch the internet, therefore never accessible to anyone who does not have physical access to the paper. Or you can create a private/public key file using a computer that is offline and send the Bitcoin to that address. Put that file on a USB flash drive and nobody can ever touch it without physical access to the device.
    The most hardcore option is to create a brain wallet (same concept as a paper wallet). One that only exists in your memory.

    Your control, your keys = your money. Not your control, not your keys = not your money.

IoT & Predictive Analytics In Healthcare

IoT & Predictive Analytics In Healthcare

IoT & Predictive Analytics In a report by Grand View Research Inc., it’s predicted that the global Internet of Things (IoT) healthcare market will reach nearly $410 billion by 2022, with mobile penetration, software automation, and innovation medical devices promising rapid testing, greater accuracy, portability, and user-friendliness. Chronic diseases such as obesity, diabetes, heart failure,…

What Do You Do With A Drunken Sailor? Look To The Cloud

What Do You Do With A Drunken Sailor? Look To The Cloud

Saferide App Petty officer Michael Daigle of the US Navy has rolled out an app to curb drunken driving in the Navy ranks. His Saferide ride-sharing service runs on Voxox’s Cloud Phone service which costs just $15 a month and is popular among US Service members abroad, where mobile phones are not permitted for use…

Red Hat Offers Container Native Persistent Storage for Linux Containers

Red Hat Offers Container Native Persistent Storage for Linux Containers

Red Hat Offers Container Storage Latest Red Hat Gluster Storage release enables greater agility and efficiency for OpenShift developers deploying application containers in production SAN FRANCISCO – RED HAT SUMMIT – June 28, 2016 – Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced new storage innovations designed to enable developers to…

Controversial Chinese Cybersecurity Law Under Review Again

Controversial Chinese Cybersecurity Law Under Review Again

Cybersecurity Law BEIJING. The National People’s Congress, the equivalence of the Chinese Parliament, moved forward in drafting a second version of a controversial cybersecurity law first introduced almost a year ago. This means the law is thought to be closer to passing and will bring greater censorship for both foreign and domestic citizens and businesses.…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of sports teams to improving science and research, even helping to aid law enforcement. Amazon Web…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Infographic Introduction – Benefits of Cloud Computing

Infographic Introduction – Benefits of Cloud Computing

Benefits of Cloud Computing Based on Aberdeen Group’s Computer Intelligence Dataset, there are more than 1.6 billion permutations to choose from when it comes to cloud computing solutions. So what, on the face of it, appears to be pretty simple is actually both complex and dynamic regardless of whether you’re in the market for networking,…

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Enabling Business Strategies The cloud is not really the final destination: It’s mid-2015, and it’s clear that the cloud paradigm is here to stay. Its services are growing exponentially and, at this time, it’s a fluid model with no steady state on the horizon. As such, adopting cloud computing has been surprisingly slow and seen more…

The Future of M2M Technology & Opportunities

The Future of M2M Technology & Opportunities

The Future Of The Emerging M2M Here at CloudTweaks, most of our coverage is centered around the growing number of exciting and interconnected emerging markets. Wearable, IoT, M2M, Mobile and Cloud computing to name a few. Over the past couple of weeks we’ve talked about Machine to Machine (M2M) such as the differences between IoT and…

The Monstrous IoT Connected Cloud Market

The Monstrous IoT Connected Cloud Market

What’s Missing in the IoT? While the Internet of Things has become a popular concept among tech crowds, the consumer IoT remains fragmented. Top companies continue to battle to decide who will be the epicenter of the smart home of the future, creating separate ecosystems (like the iOS and Android smartphone market) in their wake.…

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing Innovation Sao Paulo, Brazil has had trouble with both energy and water supplies as of late. Despite it is the rainy period. Unfortunately Sao Paulo is very dependent on its rain as a majority of its power is generated from large dams. No water, no energy. Difficult situation for a city of some…