Male Rep 3V1

 

 "Exceeding Customer Expectations"

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

With Google Chrome as its major competition, Bing needs all the help it can get just to claim a market share of the web browsing industry. Despite this, Microsoft’s search engine has encountered problems in the past with some of its top searches, including some that have caused data breaches.

What’s the Problem?
What’s the first thing that anyone who prefers Google Chrome does when they open Microsoft Edge? Simple--they download Google Chrome. Since Chrome isn’t available by default on Windows 10 devices, users have to download it, which means that they are reliant on Bing’s search results to find Google Chrome. The problem with this is that some malware sites have disguised themselves as sponsored ads for Google Chrome in Bing’s search results.

These sponsored ads would appear when a user searches for Google Chrome in the Bing search engine. Basically, instead of a legitimate sponsored ad leading to the Google Chrome download page, the malicious ad would instead bring the user to a phishing site disguised to look like the Google Chrome download page. This page would have a URL of ‘googleonline2018.com.’ If you try to access this page through Google Chrome, it’s actually blocked, but Bing and Edge don’t do this, making it a huge security issue.

These Issues Aren’t the First
Making the situation even worse is that this isn’t the first time Bing has encountered issues like this. Even as far back as April of this year, this same threat was reportedly identical to the recent version. The ad has been pulled as of this writing, but it’s strange that no explanation has been issued regarding this threat by Google, or even a confirmation that the issue has been resolved. All of these factors combine to create a situation where it’s not that unbelievable a situation like this could happen again.

Other Bing Problems
There are other problems related to Bing that have caused issues in the past, including a history of providing offensive or alarming content through its image search. For example, if you were to search for objectively neutral terms, there is a chance that, even with SafeSearch on, the image search will deliver racist search suggestions or other similarly-offensive content. Bing has also been known to push conspiracy theories through its suggested searches. Searching for the wrong thing could potentially expose users to material that they didn’t want to view in the first place, or content that could land viewers in hot water with the law.

To remain updated on similar situations to those explained above, as well as the latest security breaches and threats, subscribe to TWINTEL Solutions’s blog.

Tip of the Week: Three Pro Business Tips
8 Data Backup Terms You Should Know
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, January 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Hackers Network Security Backup Hosted Solutions Malware Mobile Devices Google Data VoIP Microsoft Disaster Recovery Business bgc communications Business Continuity Email roundup nonprofit Software Managed IT Services Alert Innovation Internet Outsourced IT Smartphones User Tips Hardware IT Services Data Backup Tech Term Windows 10 Managed IT Services Browser Saving Money Data Recovery Smartphone Ransomware Computer Server Android Cybercrime Efficiency Internet of Things Cloud Computing Small Business Business Management Productivity Workplace Tips Network IT Support BDR Communication Computers IT Support Productivity Office Cybersecurity Miscellaneous Windows Passwords Artificial Intelligence Quick Tips Save Money Holiday Applications Telephone Systems BYOD Managed IT Recovery Chrome Router Mobility Money Mobile Device Management Windows 10 Social Engineering Automation Office 365 Vulnerability Virtualization Collaboration Social Media Upgrade Law Enforcement Hacking Facebook Phishing Mobile Device Firewall Gadgets Work/Life Balance Wi-Fi Password Word Health Remote Monitoring Microsoft Office Managed Service Provider Data Protection How To Google Drive VPN Compliance Flexibility Budget Proactive IT Office Tips Information Private Cloud App Avoiding Downtime Bandwidth Bring Your Own Device Two-factor Authentication Redundancy Mobile Computing Scam Settings Spam Safety Value HaaS Information Technology Voice over Internet Protocol Software as a Service History Remote Computing Black Market Data Security Apps Servers Operating System Keyboard Connectivity Identity Theft Data Breach Managed Service Business Intelligence Sports Credit Cards Business Owner Content Management WiFi Data storage Patch Management Emergency Access Control OneNote Samsung Big Data Windows 7 Fraud Document Management Blockchain Wireless Technology Virtual Assistant Google Docs Charger YouTube Telephony Electronic Medical Records Legal Government Unsupported Software PDF Save Time Solid State Drive Human Resources Telephone System Data Storage Website HIPAA Computing Infrastructure Marketing Worker Risk Management Infrastructure Paperless Office Employer-Employee Relationship Automobile IT Management Unified Threat Management Spam Blocking Hacker The Internet of Things Machine Learning Hiring/Firing Comparison SaaS Physical Security Data Management IT Plan Cleaning USB CES Update Training Workers Entertainment Battery Content Filtering Encryption Computer Care End of Support IBM NarrowBand Safe Mode Screen Mirroring Vendor Management Scalability Experience User Error Devices Printer Windows Server 2008 Wireless Gmail Networking Computer Accessories Conferencing Downtime Smartwatch Outlook Millennials Assessment Education Cortana Wire Sync Wireless Charging IT Consultant Social Accountants MSP Data Warehousing Lifestyle Reputation Advertising Supercomputer Techology Hard Drives Microchip Cast Monitor Colocation Thought Leadership Going Green Mouse Recycling Enterprise Content Management Mobile Bluetooth Netflix Robot Authentication Workforce Television CrashOverride Google Apps Smart Office Fiber-Optic Leadership Vendor File Sharing Audit Shadow IT Customers Books Regulations Transportation Amazon Current Events Relocation Search Engine Instant Messaging Twitter Administrator Users eWaste Password Management Professional Services Files Nanotechnology Camera Frequently Asked Questions Telecommuting Public Computer Skype Cables Best Practice Content Display Practices Augmented Reality Software Tips Loyalty Computer Fan Hosted Solution Benefits Amazon Web Services Knowledge Humor Bing Staff Regulation Search Addiction Virtual Reality Criminal NIST Meetings Rootkit Politics Smart Tech Printers Excel Remote Work Password Manager Start Menu Unified Communications Audiobook Apple Security Cameras Hosted Computing Remote Worker FENG Smart Technology Online Shopping Network Congestion Help Desk Digital Signature Chromecast Multi-Factor Security Windows 10s How to Internet Exlporer Cache Laptop Worker Commute Cryptocurrency Data loss Warranty Tip of the week Business Mangement HVAC Tools Employer Employee Relationship Theft webinar Video Games iPhone Botnet Inventory Wiring HBO Specifications Touchpad Flash Two Factor Authentication Evernote Shortcuts Trending Public Cloud Troubleshooting Wireless Internet GDPR nonprofits E-Commerce Thank You Congratulations