Male Rep 1

 

 "The customer is the hero of the Story"

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

With Google Chrome as its major competition, Bing needs all the help it can get just to claim a market share of the web browsing industry. Despite this, Microsoft’s search engine has encountered problems in the past with some of its top searches, including some that have caused data breaches.

What’s the Problem?
What’s the first thing that anyone who prefers Google Chrome does when they open Microsoft Edge? Simple--they download Google Chrome. Since Chrome isn’t available by default on Windows 10 devices, users have to download it, which means that they are reliant on Bing’s search results to find Google Chrome. The problem with this is that some malware sites have disguised themselves as sponsored ads for Google Chrome in Bing’s search results.

These sponsored ads would appear when a user searches for Google Chrome in the Bing search engine. Basically, instead of a legitimate sponsored ad leading to the Google Chrome download page, the malicious ad would instead bring the user to a phishing site disguised to look like the Google Chrome download page. This page would have a URL of ‘googleonline2018.com.’ If you try to access this page through Google Chrome, it’s actually blocked, but Bing and Edge don’t do this, making it a huge security issue.

These Issues Aren’t the First
Making the situation even worse is that this isn’t the first time Bing has encountered issues like this. Even as far back as April of this year, this same threat was reportedly identical to the recent version. The ad has been pulled as of this writing, but it’s strange that no explanation has been issued regarding this threat by Google, or even a confirmation that the issue has been resolved. All of these factors combine to create a situation where it’s not that unbelievable a situation like this could happen again.

Other Bing Problems
There are other problems related to Bing that have caused issues in the past, including a history of providing offensive or alarming content through its image search. For example, if you were to search for objectively neutral terms, there is a chance that, even with SafeSearch on, the image search will deliver racist search suggestions or other similarly-offensive content. Bing has also been known to push conspiracy theories through its suggested searches. Searching for the wrong thing could potentially expose users to material that they didn’t want to view in the first place, or content that could land viewers in hot water with the law.

To remain updated on similar situations to those explained above, as well as the latest security breaches and threats, subscribe to TWINTEL Solutions’s blog.

Tip of the Week: Three Pro Business Tips
8 Data Backup Terms You Should Know
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, November 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Hackers Network Security Business Computing Backup Malware Hosted Solutions Mobile Devices Google Data VoIP Business Microsoft Disaster Recovery Software roundup Email nonprofit bgc Managed IT Services Business Continuity Alert Innovation Internet Hardware Outsourced IT communications Smartphones IT Services User Tips Windows 10 Data Backup Tech Term Managed IT Services Browser Saving Money Ransomware Computer Server Cloud Computing Data Recovery Cybercrime Android Efficiency Internet of Things IT Support Network BDR Computers Smartphone Small Business Business Management Workplace Tips Communication Productivity Windows Office Passwords Miscellaneous IT Support Quick Tips Save Money Productivity Social Engineering Telephone Systems BYOD Managed IT Cybersecurity Recovery Chrome Mobile Device Management Artificial Intelligence Applications Money Windows 10 Vulnerability Social Media Firewall Mobility Upgrade Law Enforcement Work/Life Balance Hacking Gadgets Facebook Phishing Virtualization Collaboration Automation Two-factor Authentication Managed Service Provider Health Information Flexibility Budget Microsoft Office VPN How To App Proactive IT Compliance Private Cloud Wi-Fi Bandwidth Password Bring Your Own Device Holiday Office 365 Router Office Tips Data Protection Remote Monitoring Avoiding Downtime HaaS Redundancy Safety Connectivity Data Security Servers Scam Mobile Device Apps Identity Theft Value Business Intelligence Keyboard Google Drive Remote Computing Word Information Technology History Black Market Sports Spam Data Breach Mobile Computing Operating System Legal Computer Care Wireless Technology Save Time End of Support HIPAA Data storage Patch Management IT Management Voice over Internet Protocol Risk Management YouTube OneNote Software as a Service Samsung CES Automobile Comparison Charger Settings IT Plan Encryption Managed Service Update Government Content Management Data Management PDF Electronic Medical Records USB Solid State Drive The Internet of Things Computing Infrastructure WiFi Entertainment Marketing Worker Battery Credit Cards Content Filtering Blockchain Virtual Assistant Employer-Employee Relationship Unified Threat Management Spam Blocking Business Owner Windows 7 Fraud Emergency SaaS Telephone System Physical Security Hiring/Firing Big Data Cleaning Document Management Unsupported Software Data Storage Website Training Infrastructure Workers Paperless Office iPhone Staff Regulation Professional Services Employer Employee Relationship webinar Addiction Frequently Asked Questions Shadow IT Telecommuting Books Help Desk Criminal Public Cloud NIST Skype Cables Two Factor Authentication Going Green Smart Tech Software Tips Printers Instant Messaging Machine Learning Users Amazon Web Services User Error IBM Hosted Computing Remote Worker Vendor Management Password Manager Downtime Assessment Digital Signature Meetings Best Practice Content Wireless Computer Accessories Conferencing Cache Excel Remote Work Hosted Solution Cryptocurrency Start Menu Unified Communications Reputation Advertising IT Consultant Warranty Search Business Mangement HVAC Virtual Reality Online Shopping Monitor Colocation Supercomputer Inventory Wiring Multi-Factor Security Politics Hard Drives Robot Television CrashOverride Data loss Audiobook Bluetooth Netflix Wireless Internet Tip of the week Audit Safe Mode Tools Theft Customers Leadership Devices HBO Printer How to Specifications Relocation Gmail Networking Flash Worker Commute Evernote Transportation Current Events Access Control Trending Microchip Files Public Computer Accountants Screen Mirroring MSP Video Games Cortana Wire Windows Server 2008 Loyalty Chromecast Computer Fan Laptop Thought Leadership Outlook Mouse Millennials Troubleshooting Humor Recycling Enterprise Content Management Sync Wireless Charging Hacker Benefits Knowledge Authentication Data Warehousing Scalability Lifestyle Experience Search Engine Cast File Sharing Google Docs Rootkit Google Apps Smart Office Education Apple Human Resources FENG Mobile Touchpad Twitter Administrator Workforce NarrowBand eWaste Windows 10s Password Management Techology Telephony Fiber-Optic Internet Exlporer Smart Technology Network Congestion Nanotechnology Camera Bing Amazon Practices Augmented Reality Regulations Thank You Congratulations GDPR E-Commerce nonprofits