Yet Another Bitcoin Bank Goes Bust

Yet Another Bitcoin Bank Goes Bust

Cloud News Round Up March 5th

bitcoin-bankrupt

Canadian Bitcoin Bank ‘Flexcoin’ Shuts Down After $600,000 Theft – The digital storage of things doesn’t just offer problems for data, as cloud-based cryto-currencies (a peer-to-peer digital currency that relies on cryptography) can also be built on shaky ground without the right security measures. As Bitcoin, a crypto-currency, is based in the ether and isn’t a physical form of money, it can be stolen or hacked away, just as it was recently with Canadian Bitcoin bank, Flexcoin, who have seen $600,000 worth of Bitcoins stolen. All of the coins in Flexcoin’s ‘hot wallet’ (funds that are connected to the Internet) were taken and as Flexcoin say that they do not “have the resources, assets, or otherwise to come back from this loss”, the bank will be closing down, raising further questions about Bitcoin’s future and the security it offers its users.

Security Firm Elastica Announces Funding – A key problem with embracing SaaS technology, particularly in this era of BYOD (Bring Your Own Device) is that there are an incredible amount of security risks posed by large amounts of employees having access to company data. This is a problem that Elastica would like to solve, with the SaaS security firm being in stealth mode for quite a while as they worked on their offering. However, they are now out in the public and have now announced funding, with the company securing $6.3 million in venture funding from Mayfield Fund. Rehan Jalil, the President and Chief Executive Officer of Elastica explains that “[They] are focused on enabling the elastic enterprise , where companies can achieve business agility, collaborative capability and cost efficiencies to effectively compete in today’s market,” which Elastica help with “by harnessing advanced data science and machine learning”.

Opower Files for $100 Million IPO – Utility SaaS provider Opower provides customer engagement solutions for the utility industry, working since its founding in 2007 to do so. Cloud technology is big business and big business means that there’s plenty of money to be both invested and raised and having made $89 million in sales for the fiscal year that ended December 31, 2013, it perhaps signals exactly why Opower have now made a filing with the SEC (Securities and Exchange Commission) to raise up to $100 million in an IPO (initial public offering). There’s no word on when shares will become available to buy but it has been revealed that Opower plans to list on the NYSE (New York Stock Exchange) under the symbol ‘OPWR’.

By Jennifer Livingstone

(Image Source: Shutterstock)

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

One Response to Yet Another Bitcoin Bank Goes Bust

  1. It’s very important for anyone dealing with cryptocurrency to hold their own private keys. It is always a security risk to store large amounts in another person or business’s control.

    If you’re trading, only keep a fraction of your holdings in the exchange. Even better for security is to trade peer to peer. The whole underlying concept of crypto is the core principle of decentraliztion and the first effective, workinng, TRUSTLESS economy.

    The best ways to store your own private keys are paper wallets and/or cold (offline) storage. You can print out a private/public key and have it never touch the internet, therefore never accessible to anyone who does not have physical access to the paper. Or you can create a private/public key file using a computer that is offline and send the Bitcoin to that address. Put that file on a USB flash drive and nobody can ever touch it without physical access to the device.
    The most hardcore option is to create a brain wallet (same concept as a paper wallet). One that only exists in your memory.

    Your control, your keys = your money. Not your control, not your keys = not your money.

Hoarders And Data Collectors:  On The Brink Of Unmanageability

Hoarders And Data Collectors: On The Brink Of Unmanageability

Hoarders and Data Collectors In our physical world, hoarders are deemed “out of control” when they collect too much.  Surely the same analogy applies in our online world.  When providers collect realms of data from us, it seems they lose control of that too?  In the last months it’s not just the frequency of data…

Cloud-Enabled Managed Hosting: 5 Things A Cloud Provider Should Offer

Cloud-Enabled Managed Hosting: 5 Things A Cloud Provider Should Offer

Cloud-Enabled Managed Hosting The IT industry moves at light speed fueled by constant change and advancement. No area of IT has been affected more by this change than the hosting and managed service space. Advancement in the cloud and its delivery models of IaaS and SaaS have caused a monumental shift in the way IT…

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Off Premise Corporate Data Storage Cloud storage is a broad term. It can encompass anything from on premise solutions, to file storage, disaster recovery and off premise options. To narrow the scope, I’ve dedicated the focus of today’s discussion to the more popular cloud storage services—such as Dropbox, Box, OneDrive—which are also known as hosted,…

The Modular Drone Concept In Action

The Modular Drone Concept In Action

The Modular Drone Concept As the Internet of Things (IoT) world explodes around us, it is interesting to think about new ways of solving old problems. For example, drones allow for a potential solutions to a number of long-standing problems. Aerial drones that can carry modules are appearing. These new modular drones have a number…

Cyber Physical Systems (CPS) And BYOD Security

Cyber Physical Systems (CPS) And BYOD Security

Cyber Physical Systems (CPS)  Technology has changed the world radically. But, to date, the world hasn’t changed as fast as technology to. There are a couple of concepts that are concerning as we head into the reality of CPS-deployed systems. The first is that standards don’t exist. Many companies are considering the Bring Your Own…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor