The top reward is for someone who can attack a Chromebook in guest mode Google doubled the bounty it will pay for a successful exploit of its Chromebook laptop to $100,000, sweetening the pot in hopes of drawing more attention from security researchers.The larger reward is intended for someone who finds a persistent compromise of a Chromebook in guest mode, according to Google’s security blog on Monday.“Since we introduced the $50,000 reward, we haven’t had a successful submission,” Google wrote. “That said, great research deserves great awards, so we’re putting up a standing six-figure sum, available all year round with no quotas and no maximum reward pool.”In guest mode, Chromebook has its highest defenses up: A guest can download files but can’t install apps, even from Google’s store. Creating malicious applications is one way attackers can try to install malware on a person’s computer. Google has put in place several security measures to make Chromebooks more secure. It automatically downloads software updates, runs Web pages and applications in sandboxes and does a “verified boot” on startup, which will roll back the OS if it has been tampered with by malware.Google describes what is needed for the top reward: The compromise, delivered through a Web page, must persist in guest mode even when the Chromebook is rebooted. The company has also added a reward for attacks that can bypass Chrome’s Safe Browsing feature, which flags potentially malicious URLs. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe