Latest news

Changes To The Chrome Device Management Name

Fri Apr 22 09:52:33 CEST 2016

ASUS C202 CHROMEBOOK, EXCLUSIVE TO TECH DATA!

Fri Apr 22 09:52:33 CEST 2016

**MASSIVE DISCOUNTED ON ACER CFM BUNDLE**

Fri Apr 22 09:52:33 CEST 2016

Asus Chromebox and Monitor Bundle

Fri Apr 22 09:52:33 CEST 2016 | by Amanda King

Asus Chromebox For Meeting

Fri Apr 22 09:52:33 CEST 2016

B2B Newsletter

Fri Apr 22 09:52:33 CEST 2016

The Business Value of Chrome Devices in Kiosk Mode White Paper

Fri Apr 22 09:52:33 CEST 2016 | by Dan O'Loughlin

Introducing Google Cloud and G Suite!

Fri Apr 22 09:52:33 CEST 2016 | by Dan O'Loughlin

Chromebook Cost-Saving Calculator now LIVE for UK

Fri Apr 22 09:52:33 CEST 2016 | by Dan O'Loughlin

Google Summer Boot Camp

Fri Apr 22 09:52:33 CEST 2016 | by Dan O'Loughlin

Google doubles its bounty for a Chromebook hack to $100,000

The top reward is for someone who can attack a Chromebook in guest mode

Google doubled the bounty it will pay for a successful exploit of its Chromebook laptop to US$100,000, sweetening the pot in hopes of drawing more attention from security researchers.

 The larger reward is intended for someone who finds a persistent compromise of a Chromebook in guest mode, according to Google’s security blog on Monday.

 “Since we introduced the $50,000 reward, we haven’t had a successful submission,” Google wrote. “That said, great research deserves great awards, so we’re putting up a standing six-figure sum, available all year round with no quotas and no maximum reward pool.”

In guest mode, Chromebook has its highest defenses up: A guest can download files but can’t install apps, even from Google’s store. Creating malicious applications is one way attackers can try to install malware on a person’s computer

Google has put in place several security measures to make Chromebooks more secure. It automatically downloads software updates, runs Web pages and applications in sandboxes and does a “verified boot” on startup, which will roll back the OS if it has been tampered with by malware.

Google describes what is needed for the top reward: The compromise, delivered through a Web page, must persist in guest mode even when the Chromebook is rebooted.

The company has also added a reward for attacks that can bypass Chrome’s Safe Browsing feature, which flags potentially malicious URLs.

Back to News listing