Feeds

Security 'exchange' could hit costs

Swiss security lab opens secrets 'market'

Combat fraud and increase customer satisfaction

Software development costs could be increased by a new approach to security research. Swiss software security specialist WSLabi says the results of security research are falling into the wrong hands and has launched an online 'secrets' exchange to solve the problem.

Herman Zampariolo, CEO of WSLabi, said: "The world is creating an incredible amount of software and firmware and a lot of it is not secure. We decided to set up an exchange portal to sell security research to ensure researchers get properly rewarded for their work and, at the same time, hackers can't easily get hold of it."

He told Register Developer that WSLabi has evidence that security researchers in Russia and China often sell the results of their research to criminal elements who use them to exploit so-called zero-day vulnerabilities - holes in newly-released software that have not been spotted and patched.

Under the principle of ethical disclosure, security researchers are theoretically obliged to pass on their findings to software developers. But Zampariolo argues that the research is in fact intellectual property and there should be mechanisms to protect it and sell it at market value.

"The number of new vulnerabilities found in developed code could, according to IBM, be as high as 140,000 per year. The marketplace facility on WSLabi will enable security researchers to get a fair price for their findings and ensure that they will no longer be forced to give them away for free or sell them to cyber-criminals," Zampariolo explains.

WSLabi will vet any research results it receives before making them available through its exchange portal. It will advise researchers on the best way to distribute their result to maximise their income and it will only sell research on to genuine, authenticated software and firmware developers.

WSLabi will, of course, charge fees to researchers and purchasers to cover its costs. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.