Test And Verification Services Blog

Subscribe to Test And Verification Services Blog feed
Updated: 19 hours 8 min ago

The IoT ransomware threat is more serious than you think

Fri, 26/05/2017 - 06:42

The IoT ransomware model is fundamentally different from the computer and laptop paradigm, but no less dangerous. It is only a matter of time before hackers decide it’s worth their time and try their hand at hacking IoT devices for ransom.

This is another reminder of the cybersecurity tradeoffs that IoT poses on consumers. This article explains why is IoT ransomware being underrated and should it be taken seriously.

Read More

Learn more about how T&VS IoT certification process can ensure the IoT revolution is delivering safe, secure and compliant products.

The post The IoT ransomware threat is more serious than you think appeared first on T&VS.

Categories: Software Testing

ISO 26262 – Addressing the Concerns around Emerging Technologies

Fri, 26/05/2017 - 06:35

The rapid deployment of ADAS and fully autonomous connected technologies, together with the associated cybersecurity threat has seen growing inadequacies in the original iteration of ISO 26262. This article from AutomotiveIQ describes how ISO 26262 strengthen the focus on semiconductor requirements and ensure the standard remains relevant when applied to systems commonly used in ADAS and fully autonomous driving architectures.

Read More

Find out how T&VS Functional Safety services help you to improve the safety & security requirements in electronic and electrical systems.

The post ISO 26262 – Addressing the Concerns around Emerging Technologies appeared first on T&VS.

Categories: Software Testing

How Verification Times are Changing?

Fri, 26/05/2017 - 06:28

Larger, and more complex designs with more software and hardware require new verification solutions that target the associated technological challenges. This article from Chip Design outlines how design and verification flows are changing and developing through the ages.

Read More

Find out how T&VS have developed a unique process that enables companies to make continuous improvements to their design and verification environments.

The post How Verification Times are Changing? appeared first on T&VS.

Categories: Software Testing

T&VS Security Services – Urgent Security Update – Malware ‘Adylkuzz’ Is Spreading Just Like ‘WannaCry’

Thu, 25/05/2017 - 16:47

Friday 12th May saw a large-scale ransomware attack across the globe, crippling companies and critical government services including the National-Health-Service in the UK. The appropriately named ‘WannaCry’ ransomware targeted Microsoft users, encrypting files and requesting money to be unlocked. It exploited Microsoft server message block (SMB) functionality, effecting all versions of windows operating system.

It recent days it has become apparent that another malware is using the same exploit to spread itself to unsuspecting machines. Adylkuzz is using the EternalBlue vulnerability (same as WannaCry) to exploit the systems, but it’s not a ransomware attack. It’s a botnet that shuts down SMB and uses system resources to mine for cryptocurrency.

Recommendations to protect against future malware

The following are general security best practice advice:

  • Always ensure your Microsoft patches are up-to-date.
  • Enable firewalls and disable the following ports 137,138,139,445. These are the ports ransomware utilises.
  • Ensure Antivirus software is up-to-date.
  • Stop using any unsupported windows Operating System. Always aim to regularly upgrade to the latest OS.
  • Disable Microsoft server message block (SMB)
  • Regularlyperform a secure backup of data into the cloud. This will allow a quick restore of data if an attack does occur.
  • Always be aware of phishing attacks. Avoid vulnerable websites and emails.
  • Finally, we would recommend you increase security awareness and give training for end users on how to protect themselves going forward.

Let T&VS ensure you are protected going forward. Our security team will analyse your infrastructure for potential weaknesses and provide assistance in ongoing security measures.  If you would like to know more, please see T&VS Security or contact us via email. T&VS experts will provide a simple step-by-step guide to the actions you can take now to ensure your systems are protected.

The post T&VS Security Services – Urgent Security Update – Malware ‘Adylkuzz’ Is Spreading Just Like ‘WannaCry’ appeared first on T&VS.

Categories: Software Testing

T&VS Security Services – Top3 Recommendations Following Global ‘WannaCry’ Ransomware Attack

Thu, 25/05/2017 - 08:29

The “WannaCry” ransomware appears to have used a flaw in Microsoft’s software, discovered by the National Security Agency and leaked by hackers, to spread rapidly across networks locking away files.

T&VS security service is offering top 3 recommendations to ensure you are protected from “WannaCry” and help you to secure against future ransomware.

Read More

The post T&VS Security Services – Top3 Recommendations Following Global ‘WannaCry’ Ransomware Attack appeared first on T&VS.

Categories: Software Testing

Importance of Performance Testing and Which type of performance tests should you conduct?

Thu, 25/05/2017 - 08:24

Performance testing examines responsiveness, scalability, reliability, speed and resource usage of your software and infrastructure.In the world of performance testing, it’s important to understand the several types of testing, what they consist of and how they can benefit your applications.

This article from DZone summarizes the several types of performance testing and outlines which type of performance tests should you use and how they fit into your testing cycle.

Read More

Know how T&VS ensure you implement and deliver the right performance testing approach to help you meet your objectives and business demands.

The post Importance of Performance Testing and Which type of performance tests should you conduct? appeared first on T&VS.

Categories: Software Testing

How to Protect Web Applications from attacks?

Thu, 25/05/2017 - 08:09

Web application firewalls play an essential role in maximizing throughput and ensuring to protect web applications against an attack. This article summarizes how to protect and secure your critical web applications from attacks by deploying a strong web application firewalls.

Read More

Find how T&VS Web Application Security Services enable you to prevent breaches by protecting and securing your data against web attacks, DDoS, and other botnets.

The post How to Protect Web Applications from attacks? appeared first on T&VS.

Categories: Software Testing

Why Portable Stimulus is the First Verification Model?

Thu, 25/05/2017 - 07:22

The objective of Portable Stimulus is to be able to write your verification intent once and can use it at all stages of silicon realization. This article from EDA Café summarizes the reasons that states why portable stimulus is the first true verification model. A single Portable Stimulus model can be used as an input to synthesize tests for a variety of target execution platforms, including UVM, simulation, emulation, post-silicon validation, etc.

Read More

Find out how T&VS portable stimulus specification addresses today industry verification challenges.

The post Why Portable Stimulus is the First Verification Model? appeared first on T&VS.

Categories: Software Testing

See T&VS at DAC 2017 – 18-22 June, Austin TX.

Wed, 24/05/2017 - 17:17

The Design Automation Conference (DAC) is the premier conference devoted to the design and automation of electronic systems (EDA), embedded systems and software (ESS), and  intellectual property (IP). DAC offers outstanding training, education, exhibits and superb networking opportunities for designers, researchers, tool developers and vendors.

At this year’s event Mike Bartley, founder and CEO of T&VS will be contributing to the following panel discussion.

DAC Panel : Verification Necessity: When is Enough Too Much? Mike Bartley
T&VS Founder and CEO

One contributing factor to the growing verification complexity is the emergence of new layers of verification requirements that did not exist years ago and that are driving the need for new solutions and expertise. Given a complex SoC project’s constraints (i.e., finite resources, finite time, and finite budget) some of the important questions that will be put to the panel include: How do you construct an efficient, effective, and productive verification flow?  and When is a proposed verification solution a necessity or nicety?

  • Moderator: Brian Bailey – Semiconductor Engineering
  • Wednesday June 21, 4:30pm – 5:20pm –  12AB
  • Track: EDA and Embedded Systems
  • Panelists:
    • Mike Bartley – Test and Verification Solutions
    • David Lacey – Hewlett Packard Enterprise
    • Ashish Darbari – OneSpin Solutions GmbH, Munich, Germany
    • Lauro Rizzatti – Rizzatti LLC, Portland, OR
    • Amol Bhinge – NXP Semiconductors, Austin, TX
  • DAC Website: Verification Necessity: When is Enough Too Much?
Meet Us at DAC 2017

If you would like to meet up at DAC to discuss you Test and Verification requirements, including all aspects of Hardware Verification, Software Testing, Security Testing & Data Protection or Safety Compliance, please contact us to arrange a suitable time and place.

The post See T&VS at DAC 2017 – 18-22 June, Austin TX. appeared first on T&VS.

Categories: Software Testing

Essential components to building a Security Testing practice

Wed, 24/05/2017 - 06:48

Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended. Secure development testing also affords security teams with higher visibility into security risks early in the product lifecycle.

This article from Techwell highlights how to build the security layers in software development life-cycle which make difficult for hackers to exploit the current known security vulnerabilities that exist in the technology world.

Read More

Find how T&VS Security Testing Services help ensure the correct security features are built into devices at the outset and processes to assist with ongoing maintenance and updates.

The post Essential components to building a Security Testing practice appeared first on T&VS.

Categories: Software Testing

How to Protect the IoT with secure hardware

Wed, 24/05/2017 - 06:35

As the IoT devices continues to expand exponentially, security threats to hardware is an also growing concern and it becomes more of a reality to the organizations, the importance of securing the billions of remote, connected objects, networks against cyber-attack becomes increasingly challenging. This article explores why the use of secure hardware is recommended for protecting today’s user-accessible networked IoT infrastructure.

Read More

Learn how T&VS IoT Security services allow you to take a comprehensive approach to maintain the security, and protect your IoT devices from cyber threats.

The post How to Protect the IoT with secure hardware appeared first on T&VS.

Categories: Software Testing

Is Crowdsourced Testing Right for My Team?

Tue, 23/05/2017 - 07:54

Crowdsourced testing is an emergent method of QA testing which leverages a dispersed, temporary workforce to test software applications quickly and effectively. This article from DZone summarizes the best practices that help you decide why crowdsourced testing is the right for your team and outlines why crowdsource testing can be a powerful tool for optimizing your workflow.

Read More

Find out how T&VS services let you integrate crowdsourced testing into your development workflow to ensure higher quality and more accurate test results.

The post Is Crowdsourced Testing Right for My Team? appeared first on T&VS.

Categories: Software Testing

Do we need Penetration testing?

Tue, 23/05/2017 - 07:50

Penetration test not only reveals vulnerabilities but also actively exploit vulnerabilities to find a real possibility of hacker attack directed against the IT structure, data, or the physical security of an organization. This article summarizes the benefits of performing penetration test for organizations and outlines what are the business needs to periodically check cybersecurity of their networks, software, websites, and applications.

Read More

Understand how T&VS Penetration Testing services help to maintain compliance, eliminate IT security threats, and can reveal how hackers may breach systems.

The post Do we need Penetration testing? appeared first on T&VS.

Categories: Software Testing

How Emulation’s Footprint is Growing?

Tue, 23/05/2017 - 07:47

This article from Semiengineering outlines why emulators are suddenly indispensable to a growing number of companies and how emulation also has been going through several transformations that have made it more affordable, more useable, and more complete verification tool.

Read More

Find out how T&VS Hardware Emulation services allow verifying the robustness of a design and helps optimize the design for improved performance.

The post How Emulation’s Footprint is Growing? appeared first on T&VS.

Categories: Software Testing

T&VS Awarded Place On The UK Government G-Cloud 9 Procurement Framework To Provide Cloud Support Services

Mon, 22/05/2017 - 15:00

22 May 2017,  Bristol, UK. – Test and Verification Solutions (T&VS), a leading hardware verification and software testing provider is proud to announce its appointment as a supplier to the UK government’s public sector cloud framework G-Cloud 9, under Cloud Support Services.

The G-Cloud procurement framework is part of the UK Governments Digital Marketplace, giving public sector organisations an easy solution for sourcing specialists for Cloud-related projects.  Eliminating the need for buyers to run complicated tenders, purchasing through the G-Cloud 9 framework is designed to make the purchase of Cloud services both faster and cheaper for public sector bodies.  Offering the dual benefit of shorter procurement cycles and faster service deployment.

This year has seen T&VS update their product solution set ready for G-Cloud 9, with a focus on the current industry challenges and the latest innovative testing solutions, including:

G-Cloud 8 Framework“T&VS have delivered a number of testing solutions to the public sector over the last 9 years and we have enjoyed great success providing testing services that have added real value” said Dr Mike Bartley CEO of T&VS. “Being awarded G-Cloud 9 is a major achievement for T&VS and we aim to continue to be the right choice for quality testing services in the public sector.”

About the Crown Commercial Service (CCS)

CCS works with both departments and organisations across the whole of the public sector to ensure maximum value is extracted from every commercial relationship and improve the quality of service delivery. The CCS goal is to become the “go-to” place for expert commercial and procurement services.

About T&VS

T&VS (Test and Verification Solutions Ltd) provides services and products to organisations developing complex products in the microelectronics and embedded systems industries. Such organisations use T&VS to verify their hardware and software products, employ industry best practice and manage peaks in development and testing programmes. T&VS’ embedded software testing services includes onsite/offshore testing support including assistance with safety certification and security testing. T&VS hardware verification services include onsite/offshore verification support and training in advanced verification methodologies. T&VS also offers Verification IPs and its own Verification (EDA) signoff tool.

T&VS Company Contact

 

 

The post T&VS Awarded Place On The UK Government G-Cloud 9 Procurement Framework To Provide Cloud Support Services appeared first on T&VS.

Categories: Software Testing

T&VS Security Services – Top3 Recommendations Following Global ‘WannaCry’ Ransomware Attack

Fri, 19/05/2017 - 07:29

Last Friday 12th May saw another largescale ransomware attack across the globe, crippling companies and critical government services including the National-Health-Service in the UK. The appropriately named ‘WannaCry’ ransomware targeted Microsoft users, encrypting files and requesting money to be unlocked.

How did this ransomware occur and why did it have such devastating effects? The actual security hole was part of a‘National-Security-Agency’ security toolkit that was leaked onlineby a group of hackers. It exploited Microsoft server message block (SMB) functionality, effecting all versions of windows operating system. The security hole was identified last week by Microsoft and patches issued to fix the issue. However,many users and organisations take a long time to ensure their devices are updated with latest patches, leaving a window of opportunity for the ransomware.

T&VS Security Services – Top3 recommendations to ensure you are protected from WannaCry:

  • Always ensure your Microsoft patches are up-to-date. The essential patch for the WannaCry is MS17-010 patch. This will give you 65% security.
  • Enable firewalls and disable the following ports 137,138,139,445. These are the ports this ransomware utilises.
  • Ensure Antivirus software up-to-date.

(Some of the above recommendations seem obvious but if they had been followed then the ransomware would not have been so prevalent.)

Recommendations to protect against future ransomware:

The following are general security best practice advice:

  • Stop using any unsupported windows Operating System. Always aim to regularly upgrade to the latest OS.
  • Disable Microsoft server message block (SMB)
  • Regularyperform a secure backup of data into the cloud. This will allow a quick restore of data if an attack does occur.
  • Always be aware of phishing attacks. Avoid vulnerable websites and emails.
  • Finally, we would recommend you increase security awareness and give training for end users on how to protect themselves going forward.

 

Let T&VS ensure you are protected going forward. Our security team will analyse your infrastructure for potential weaknesses and provide assistance in ongoing security measures. If you would like to know more, please see T&VS Security or contact us via email.

Join the T&VS webinar. T&VS experts will provide a simple step-by-step guide to the actions you can take now to ensure your systems are protected.

The post T&VS Security Services – Top3 Recommendations Following Global ‘WannaCry’ Ransomware Attack appeared first on T&VS.

Categories: Software Testing

With enterprise IoT, the best is yet to come

Fri, 19/05/2017 - 07:24

IoT has become a broad development in various technologies across industries that is fundamentally changing the innovation cycle everywhere. This article summarizes on how can enterprises leverage this IoT growth opportunity and describes who’s leading the growth within an enterprise.

Read More

Learn how T&VS IoT Security services allow you to take a comprehensive approach to maintain the security,and protect your IoT devices from cyber threats.

The post With enterprise IoT, the best is yet to come appeared first on T&VS.

Categories: Software Testing

How to Do Security Testing for Web Applications?

Fri, 19/05/2017 - 07:22

Security testing is performed to detect vulnerabilities in an application, while ensuring that the data is protected and that the application works as required. Among the various kinds of applications, web applications demand more security as they involve enormous amounts of important data and online transactions.

This article from Test Bytes summarizes an approach for security testing of web applications and ensure that they are not vulnerable to any cyber-attacks.

Read More

Find how T&VS Web Application Security Services enable you to prevent breaches by protecting and securing your data against web attacks, and vulnerabilities.

The post How to Do Security Testing for Web Applications? appeared first on T&VS.

Categories: Software Testing

It’s Time for an Embedded Systems Design Verification Revolution

Fri, 19/05/2017 - 07:14

This article describes why today, the revolution is building in the verification space and outlines how the verification methodologies will roll out over the next two decades, and make the process of silicon realization more efficient and effective.

Read More

Find out how T&VS Verification services help to meet the challenging requirements with respect to performance, flexibility and verify the today’s complex designs effectively.

The post It’s Time for an Embedded Systems Design Verification Revolution appeared first on T&VS.

Categories: Software Testing

How IoT is changing the Healthcare Industry?

Thu, 18/05/2017 - 07:16

With the emergence of IoT and devices, the healthcare industry is benefiting from seamless connectivity, improved data and information between healthcare professionals and patients.This article explores how the IoT is gaining traction in the healthcare industry which improve quality and the continuum of care.

Read More

Find how T&VS Healthcare IoT services help manufacturers and customers to securely design and develop smarter healthcare systems.

The post How IoT is changing the Healthcare Industry? appeared first on T&VS.

Categories: Software Testing

Pages