Risk
9/5/2012
12:38 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Mission Critical Improvements To Embedded Device Security

Achilles Test Software delivers tools that development teams require to test critical software early in the development cycle

VANCOUVER, British Columbia ­ Sept. 5, 2012 ­ Wurldtech Security Technologies, leaders in protecting mission-critical connected devices from persistent and dynamic cyber security threats, today announced the release of its Achilles Test Software, the software version of its Achilles Test Platform, extending its Achilles Test family of cyber security testing products to development teams of mission critical embedded devices.

Significant SCADA cyber attacks are plaguing the industry. Industrial Control Systems have evolved into complex, open, inter-connected networks, creating significant challenges for developers and manufacturers of mission-critical devices that are at the core of nuclear power plants, oil refineries, smart grids and medical applications.

³The Achilles Test Software is the next step in elevating industry standards to protect mission-critical connected devices from persistent cyber security threats,² said Wurldtech CTO and co-founder, Nate Kube. ³Our goal is to provide a complete cyber security solution supporting the entire product lifecycle, from development to commissioning, implementation and operation of critical infrastructure, ensuring the delivery of secure products, increased ROI and protection of brand equity for both the device manufacturer and their customers.²

Achilles Test Software delivers the tools that development teams require to test critical software early in the development cycle, before they enter the QA lab. It provides the means to proactively expose and correct vulnerabilities and validate system resiliency in a real-time environment, before the products are released and deployed in high-availability process control networks.

The Achilles Product Portfolio - Analyze, Discover, Mitigate and Certify

Wurldtech provides a total set of analysis, software, hardware and certification products that provide stakeholders with a set of tools to protect and mitigate against Zero-Day threats, malware and cyber attacks.

­ Achilles Test Software ­ Previously available only as a comprehensive appliance - Achilles Test Platform, Achilles Test Software puts Achilles testing in the hands of development and quality assurance (QA) teams, enabling a corporate and strategic focus to cyber testing by allowing for candidate software and hardware testing earlier in the development cycle.

­ Achilles Test Platform ­ Hardware platform designed as a universal test bench to allow equipment manufacturers of all sizes to conduct comprehensive security and robustness testing throughout the product development lifecycle. Engineers can now utilize Achilles Test Software to test for device vulnerabilities at the earliest stage of development, using Achilles Test Platform for final verification testing.

­ Achilles Communication Certification ­ Verifies network robustness of industrial control devices by subjecting the device to a standardized set of network tests. Certification is provided by Wurldtech engineering teams upon inspection of testing data.

­ Achilles Practices Certification ­ Valued-added program tailored to the needs of system owners and operators, verifies the device manufacturers security practices and procedures across the product¹s lifecycle.

About Wurldtech Security Technologies Founded in 2007, Wurldtech is a software company providing protection for mission critical connected devices against the persistent and dynamic threat of cyber attack. Wurldtech follows our customers¹ security lifecycle by providing innovative assessment products to discover and analyze threat and vulnerability profiles; mitigation of known vulnerabilities in installed networks with Achilles Threat Intelligence Signatures and device and development practice certification through Achilles Certification. Wurldtech¹s internationally recognized cyber security experts help industrial stakeholders identify and mitigate cyber security vulnerabilities to reduce the risk and cost of attacks. Global customers worldwide spanning Oil & Gas, Electric Power, Medical, Nuclear, Chemical and Water Treatment markets currently use Wurldtech solutions. Visit wurldtech.com for more information.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-4988
Published: 2014-07-09
Heap-based buffer overflow in the xjpegls.dll (aka JLS, JPEG-LS, or JPEG lossless) format plugin in XnView 1.99 and 1.99.1 allows remote attackers to execute arbitrary code via a crafted JLS image file.

CVE-2014-0207
Published: 2014-07-09
The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file.

CVE-2014-0537
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-0539
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-3309
Published: 2014-07-09
The NTP implementation in Cisco IOS and IOS XE does not properly support use of the access-group command for a "deny all" configuration, which allows remote attackers to bypass intended restrictions on time synchronization via a standard query, aka Bug ID CSCuj66318.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.