Category Archives: Technology

Kaseya VSA Supply-Chain Ransomware Attack Update 7-9-21 Podcast

Here is the latest on the Kaseya VSA supply-chain ransomware attack which is interesting because there is now strong interplay between the United States government and companies like Kaseya given the national security implications of this type of ransomware attack. Please feel free to listen to this podcast with a brief update on the government involvement in the response to this ransomware attack and on the type of directives that the federal government is now giving out through government agencies like the US Cybersecurity and Infrastructure Security Agency (CISA) and the FBI. It was widely reported that the CEO of Kaseya on 1st notification of this ransomware attack contacted the federal government and spoke with national security officials at the White House and in the Department of Homeland Security. Obviously, every ransomware attack will not necessarily invoke this high-level government response, but more and more the government is involving itself in the investigation and response to these attacks which have been heavily linked to entities like REvil which is alleged to be based in Russia. Pres. Biden today allegedly called Pres. Putin to once again warn him regarding the cybersecurity attacks and he promised in the media that there would be a response from the United States. For more information on the specific CISA-FBI recommendations in response to the Kaseya VSA supply-chain ransomware attack see this link to the CISA website: https://us-cert.cisa.gov/ncas/current-activity/2021/07/04/cisa-fbi-guidance-msps-and-their-customers-affected-kaseya-vsa . See the link below for my short podcast with this update.

Kaseya VSA Supply-Chain Ransomware Attack Update 7-9-21 PIT IP Tech Cast

Here is the latest on the Kaseya VSA supply-chain ransomware attack which is interesting because there is now strong interplay between the United States government and companies like Kaseya given the national security implications of this type of ransomware attack.
  1. Kaseya VSA Supply-Chain Ransomware Attack Update 7-9-21
  2. Kaseya VSA Server Ransomware Attack July 2021 – Lessons and Protocols for Dealing with Data Breach
  3. The Rise of Counterfeiting Litigation in Federal Courts

Kaseya VSA Server Ransomware Attack July 2021 – Lessons and Protocols for Dealing with Data Breach

Podcast:

Kaseya VSA Supply-Chain Ransomware Attack Update 7-9-21 PIT IP Tech Cast

Here is the latest on the Kaseya VSA supply-chain ransomware attack which is interesting because there is now strong interplay between the United States government and companies like Kaseya given the national security implications of this type of ransomware attack.
  1. Kaseya VSA Supply-Chain Ransomware Attack Update 7-9-21
  2. Kaseya VSA Server Ransomware Attack July 2021 – Lessons and Protocols for Dealing with Data Breach
  3. The Rise of Counterfeiting Litigation in Federal Courts

Blog:

See Kaseya CEO Video response presentation: https://www.kaseya.com/

See Updates Regarding VSA Security Incident Response: https://www.kaseya.com/potential-attack-on-kaseya-vsa/

In any Cyber incident, Data breach, hack or unwanted email intrusion, like the recent Kaseya attack, Incident Response (IR) time is of the essence. The Business and Cybersecurity Litigation lawyers at Houston Harbaugh, P.C., are here to assist in addressing the cybersecurity issues facing companies today. A comprehensive set of issues must be addressed to aid companies in minimizing the risk of cybersecurity breaches and to aid companies not if, but when, a data breach occurs. Ransomware, e-mail spoofing, text and phone call spoofing, e-mail intrusion, phishing and other schemes are running rampant in the business world. Sophisticated companies are falling prey to wire fraud schemes and ransom attacks at an alarming rate. These victims frequently turn to their insurance carriers but the maze of seeking insurer indemnity and defense for these matters is complex. Our firm can help work through that maze on both the technical side of investigation and on the mitigation side including the analysis of insurance coverage options. Our litigation lawyers are well equipped to handle IR and to tackle both the initiation of, or defense of, litigation related to these cyber security breaches and losses.

Data breaches are one of the biggest risks facing companies today. Companies must take action to prepare for the worst and to react quickly when it happens on both the technical side and the legal side. Our firm can cyber-counsel on corporate structure issues, insurance coverage, employment law, HIPAA and personal and health care data issues, and protection of data through proper technology infrastructure, technology rules and policies, corporate and employment policies and litigation if necessary. Cybersecurity takes a team to protect companies and their data through security programs, security awareness training, annual security audits and Incident Response. A cyber incident or intrusion which results in a breach of Personally Identifiable Information (PII) may trigger certain legal reporting requirements. See (Westlaw’s link): Pennsylvania Statutes 73-2301: Breach of Personal Information Notification Act. A link to the actual Pennsylvania statute can be found hereHere is a summary of the Pennsylvania Notification Act:

  • Enacted in 2006, Pennsylvania’s data breach notification law requires entities doing business in Pennsylvania that maintain, store, or manage computerized personal information of Pennsylvania residents to notify affected individuals of any data breach that results or could result in the unauthorized acquisition of their unencrypted and unredacted personal information.
  • Notice must be made without unreasonable delay
  • If more than 1,000 individuals must be notified, breached entities must also notify all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis.
  • Breached third parties must notify relevant data owners or licensees.
  • Substitute notice is permitted in specific circumstances and notification may be delayed for law enforcement purposes.
  • Entities which maintain their own notification procedures as part of an information security policy consistent with state law are deemed to comply with the notification requirements of this law if the entity makes notifications in accordance with its policies.
  • Financial institutions compliant with the Federal Interagency Guidance Response Programs for Unauthorized Access to Consumer Information and Customer Notice are deemed to comply with this law, as are entities that comply with relevant notification requirements of federal regulators.

Our firm can help guide you through these reporting requirements but it is best to be prepared in advance. We can help you prepare and can refer you to good technical people for up front assistance.

Data breaches are the ultimate sneak attack. A company’s computer systems can be breached for weeks, months and even years without the breach being detected. Once detected, what action must the company take? A team that includes attorneys, company executives, law enforcement, IT and human resource management should be in place and prepared to address the various problems that arise. These problems include legal issues —regulatory compliance, protection of intellectual property, recovery of losses, and litigation —technical issues, notification issues, customer relations, public relations, and insurance issues.

Houston & Harbaugh cybersecurity attorneys have presented both regionally and nationally the following topics: “The Potential Consequences of Data Breach on Compromise or Infringement of Intellectual Property” and “Protecting Your Business in the Digital Age”. To read more about this topic and to see legal resources regarding Cybersecurity and Data Breach Response, please see this website’s Resource Library. 

Contact Our Pennsylvania Cybersecurity Attorneys Today: Houston Harbaugh can help your company take action to minimize the threat from data breaches and to guide you through IR. For immediate help on data breach or ransomware response, contact HH Shareholder Henry Sneath by email now to databreach@hh-law.com or call: 1-833-511-2243   

The Rise of Counterfeiting Litigation in Federal Courts

Not surprisingly, with the massive sale and transport of goods through Amazon and Alibaba, we are seeing and handling in the courtroom litigation world a lot of actions involving alleged counterfeiting and resultant sales of products on these website marketplaces. These claims involve the freezing of the Amazon Sellers’ financial accounts with Amazon through Federal Court Temporary Restraining Orders (TRO’s) and preliminary injunctions and are being brought primarily pursuant to Federal Statutory Law, potentially allowing for recovery of attorneys fees and punitive damages. These cases are being filed as though they were class actions or mass tort cases, and involve sometimes hundreds of defendants. Most defendants suffer judgment against them by default for failure to answer the complaint, even though the courts are waiving normal service of process rules and are allowing service of the complaint on these defendants by email. Many are foreign entities with fictitious names and in many cases they choose simply to forfeit the amount of money that they have in their Amazon account. Their entire Amazon account is frozen even if the allegedly infringing sales are very small and make up only a small portion of their Amazon funds. These suits fall generally into two camps:

Camp one generally consists of allegations of Federal Lanham Act violations like trademark infringement, false advertising, false designation of origin, counterfeiting and “knock-off”. See: https://www.hh-law.com/intellectual-property-audits-application-prosecution-protection-litigation/trademarks/

Camp 2 is the allegation of patent infringement by the alleged knock-off products. See:  https://www.hh-law.com/intellectual-property-audits-application-prosecution-protection-litigation/patent-infringement/

While these two variations sound similar, they each require a solid understanding of either or both, the Lanham Act/Trademark Law or an understanding of patent law on infringement and USPTO proceedings. There are actions filed in the US District Court for the Western District of Pennsylvania and in many other federal jurisdictions. Our Houston Harbaugh law firm intellectual property group which I chair is prepared to prosecute or defend these matters and I can be reached at sneathhm@hh-law.com or 412-288-4013.

Redefining Your Business Strategy for Post #Covid – 19: A Free @Simio Webinar Tomorrow May 7, 11:00 AM – #DataSimulation*

How do you plan for today and the future in a time of uncertainties? Do you simply wait out the pandemic, or apply analytics to develop workable strategies that keep your business functional?  

This FREE and short Simio webinar TOMORROW on May 7th, 2020 at 11:00 am ET (3:00 pm UTC) will share insights that will allow you to see how you can apply simulation to evaluate different response scenarios for your business.  
  Tomorrow’s webinar will give a glimpse into data simulation and how it can be used to predict outcomes based on your available options. It will also showcase the importance of data simulation modeling in providing insight for capacity planning and predictive analytics during a pandemic and a post-pandemic scenario. Stakeholders, managers, and decision-makers will learn valuable lessons on advanced planning and resource management using Simio as an analytical tool. This webinar will also help employees across every industry understand why certain decisions are been taken and the importance of resource management.  Regardless of your industry, you will learn how to apply simulation to enhance daily operations and manage complex processes.  
Presenters: 1) Dan O’Neil, Health Systems Innovation Lead at Johns Hopkins University Applied Physics Laboratory 2) Adam Sneath, Application Engineer at Simio.
Click Here to Register Today: or use this link to Simio, LLC in Pittsburgh: https://www.simio.com/resources/webinar/2020-05-07-Simio-Webinar.php

* This announcement is not providing legal advice or is it in any way an endorsement of SIMIO by any lawyer or law firm, but merely a suggestion of a possible resource for businesses and individuals as businesses and health care facilities re-open. Houston Harbaugh and Henry Sneath are not involved in the content development, nor presentation of this program.

BLOCKCHAIN: Is it the Next Big Step in Data Security?

From Law.Com and its Legaltech news former Microsoft CTO Adrian Clarke (Evident Proof) reports on the technology of Blockchain and its purported major security benefits for the supply ecosystem. “The blockchain is a transaction ledger that is uneditable and virtually unhackable. New information can be written onto the blockchain, but the previous information (stored in what are known as blocks) can’t be adjusted. Every single block (or piece of data) added to the chain is given an encrypted identity. Cryptography effectively connects the contents of each newly added block with each block that came before it. So any change to the contents of a previous block on a chain would invalidate the data in all blocks after it.” Clarke’s report here is perhaps some comfort for an exponentially growing sector of the world wide economy which relies on supply chain management on a massive scale. See his piece in Law Journal Newsletters at http://tinyurl.com/y7mqfnem 

Attorneys Bill Cheng and John Frank Weaver at McLane Middleton, P.A. in New Hampshire posted this piece in the NH Business Review at: http://tinyurl.com/yblh6nqp regarding the interaction between Blockchain and Bitcoin and how the GDPR for example will struggle to deal with these technologies, given the protections that GDPR attempts to provide to data owners so that they can control their personal information and data. Blockchain, particularly in conjunction with Bitcoin as the currency for a Blockchain secured transaction will prove a challenge to the GDPR rules. CTOs, Industrial Engineers and Supply Chain designers have big decisions to make in the years to come regarding security and whether Blockchain is the answer to some data protection issues. Photo courtesy of Law.Com.

Posted by Henry M. Sneath, Esquire Co-Chair Litigation Practice Group and Chair of the IP Practice Group: Houston Harbaugh, P.C.  401 Liberty Avenue, Pittsburgh, Pa. 15222Sneath is also an Adjunct Professor of  Law teaching two courses; Trade Secret Law and the Law of Trademarks and Unfair Competition at Duquesne University School of Law. Please contact Mr. Sneath at 412-288-4013 or sneathhm@hh-law.com

 

 

From Relecura: Semiconductor Sensors. Building the Wave in IoT Development

As the Internet of Things (IoT) develops, there is an increasing need to “sense” changes in the atmospherics which surround semiconductors. In other words, the working chips must get smarter and smarter and have feel! Some of that AI feel in chips is being supplied by sensing chips – the layered structure of wafers of semiconductor material which can “sense” changes in the environment it is measuring or into which it is placed. Gas sensors are particularly important and patent applications for these devices are on the upswing internationally, with Sony and Samsung leading the way. See Relecura article at http://tinyurl.com/ybrojuq2
Edaphic Scientific describes a gas sensor’s performance as follows:  “Semiconductor gas sensors rely on a gas coming into contact with a metal oxide surface and then undergoing either oxidation or reduction. The absorption or desorption of the gas on the metal oxide changes either the conductivity or resistivity from a known baseline value. This change in conductivity or resistivity can be measured with electronic circuitry. Usually the change in conductivity or resistivity is a linear and proportional relationship with gas concentration. Therefore, a simple calibration equation can be established between resistivity/conductivity change and gas concentration.” http://tinyurl.com/y6ufz7vx
The IoT relies on smarter and smarter technology as it governs many things around us. Products will have this smarter and smarter technology and converting “sensing” into electronic circuitry will likely have a positive impact on performance, but will present new challenges as products fail and cause damage to person or property. How deep a dive will be required in products liability litigation for example when a “sensor chip” fails to sense. Sensor chips have been around for a while, but they are becoming tremendously sophisticated and integral to the virtual world in which we operate.

Posted by Henry M. Sneath, Esquire Co-Chair Litigation Practice Group and Chair of the IP Practice Group: Houston Harbaugh, P.C., 401 Liberty Avenue, Pittsburgh, Pa. 15222. Please contact Mr. Sneath at 412-288-4013 or sneathhm@hh-law.com

 

 

 

 

 

Quantum Computing – The Next Tech Frontier – Qubit by Qubit?

(“This superconducting chip, with a total area of one square centimeter, consists of nine qubits in a 1D array. Microwave pusles are applied to control their states and their interaction, and consequently control the dynamics of the system. Such Josephson-junction based superconducting systems are a leading physical implementations for quantum computation and simulation processing. Credit: Eric Lucero/Google, Inc.”

Is Quantum Computing the next Tech frontier? Collaboration between researchers at Google and UC Santa Barbara are working on super computing qubits which might lead to “quantum supremacy” in the computing world. One chief researcher describes it as the desire to “perform an algorithm or computation that couldn’t be done otherwise.” Where classical computers function in two states, zeroes and ones – qubits perform in three states with the extra state being a “superposition” of both zero and one “raising exponentially the number of possible states a quantum system can explore.” For more details see Phys.ORG

Posted by Henry M. Sneath, Esq.                                              Shareholder and Director;                                                                                        Co-Chair of the Litigation Department;                                                    Chair of the IP Department;                                                                         Houston Harbaugh, P.C.  (www.hh-law.com)                                                    Pittsburgh, Pa.                                                                                                              Please contact Mr. Sneath at 412-288-4013 or sneathhm@hh-law.com

E-Discovery Practice Tips from Federal Judges

From Legal Tech News and ALM comes a good lawyer practice tip report from Federal Judges Sallie Kim and Xavier Rodriguez. Major hint is for lawyers to go back and read the 2015 revisions to the Federal Rules which govern discovery, data collection and electronic productions of documents. Read the article here on ALM/Legal Tech: http://tinyurl.com/yclmj9hv 

Posted by Henry M. Sneath, Esq.                                                         Shareholder and Director;                                                                                    Co-Chair of the Litigation Department;                                                    Chair of the IP Department;                                                                         Houston Harbaugh, P.C.  (www.hh-law.com)                                                    Pittsburgh, Pa.                                                                                                              Please contact Mr. Sneath at 412-288-4013 or sneathhm@hh-law.com 

Walmart USPTO Application for “Drone Pollinators” Published

Walmart has applied for a Drone Pollinator presented in the recently published application as “Systems and Methods for Pollinating Crops Via Unmanned Vehicles.” Here is Application # US2018/0065749 A1 at this link from FreshPatents.com:  http://images2.freshpatents.com/pdf/US20180065749A1.pdf
The PTO App abstract describes essentially the same process used by Bees, and scientists at Walmart, Harvard and many other institutions have been working to create an efficient way to pollinate many of the plants from which we get our food during the last two decades of declining bee populations. Here is a good article from Science Alert detailing and linking to some of the efforts to create a drone pollinator:   http://tinyurl.com/y93a7z7y  
Here is a photo of the Harvard latest edition drone “RoboBee” which allegedly cannot yet be remotely controlled. The Walmart patent claims such an ability. We will follow.

Posted by Henry M. Sneath, Esq. at HoustonHarbaugh, P.C. in Pittsburgh, Pa.
  Mr. Sneath can be contacted at 412-288-4013 or at: https://www.hh-law.com/professional/henry-m-sneath/ He chairs the IP Practice group at HoustonHarbaugh and is Co-Chair of the Litigation Practice Group.

From Legal Tech/Law.Com news: A Bug Bounty for Discounts on Cyber Insurance

From our friends at Law.Com: In the growing market for cyber insurance, carriers are trying to compete on price.  One carrier, Coalition is offering discounts if your company creates a partnership with a “white hat hacker” and establishes a bug bounty with that hacker. The hacker gets a bounty for finding vulnerabilities. Legal Tech author Rhys Dipshan details the program in the article at this link: http://tinyurl.com/ydck3nxg

Dipshan reports that “bug bounties” are becoming a popular weapon in combating cyber attacks. “Unsurprisingly” Dipshan reports, “bounty programs are becoming increasingly common in the tech and corporate world, with companies such as FacebookMicrosoft and Uber offering compensation for vulnerability disclosures. They also have caught on in the federal government as well, with the Department of Defense launching its “Hack the Pentagon” and “Hack the Air Force” programs.” Do you need a cyber bounty hunter?

Posted by Henry M. Sneath, Esq.  HoustonHarbaugh, P.C. – Pittsburgh, Pa.  https://www.hh-law.com Chair of the Intellectual Property Practice Group and Co-Chair Litigation Practice Group. Contact at: sneathhm@hh-law.com or 412-288-4013

%d bloggers like this: