shutterstock 6840 TEST SIZE V1 051116

 

 "Experienced Analysts are ready to help you."

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

With Google Chrome as its major competition, Bing needs all the help it can get just to claim a market share of the web browsing industry. Despite this, Microsoft’s search engine has encountered problems in the past with some of its top searches, including some that have caused data breaches.

What’s the Problem?
What’s the first thing that anyone who prefers Google Chrome does when they open Microsoft Edge? Simple--they download Google Chrome. Since Chrome isn’t available by default on Windows 10 devices, users have to download it, which means that they are reliant on Bing’s search results to find Google Chrome. The problem with this is that some malware sites have disguised themselves as sponsored ads for Google Chrome in Bing’s search results.

These sponsored ads would appear when a user searches for Google Chrome in the Bing search engine. Basically, instead of a legitimate sponsored ad leading to the Google Chrome download page, the malicious ad would instead bring the user to a phishing site disguised to look like the Google Chrome download page. This page would have a URL of ‘googleonline2018.com.’ If you try to access this page through Google Chrome, it’s actually blocked, but Bing and Edge don’t do this, making it a huge security issue.

These Issues Aren’t the First
Making the situation even worse is that this isn’t the first time Bing has encountered issues like this. Even as far back as April of this year, this same threat was reportedly identical to the recent version. The ad has been pulled as of this writing, but it’s strange that no explanation has been issued regarding this threat by Google, or even a confirmation that the issue has been resolved. All of these factors combine to create a situation where it’s not that unbelievable a situation like this could happen again.

Other Bing Problems
There are other problems related to Bing that have caused issues in the past, including a history of providing offensive or alarming content through its image search. For example, if you were to search for objectively neutral terms, there is a chance that, even with SafeSearch on, the image search will deliver racist search suggestions or other similarly-offensive content. Bing has also been known to push conspiracy theories through its suggested searches. Searching for the wrong thing could potentially expose users to material that they didn’t want to view in the first place, or content that could land viewers in hot water with the law.

To remain updated on similar situations to those explained above, as well as the latest security breaches and threats, subscribe to TWINTEL Solutions’s blog.

Tip of the Week: Three Pro Business Tips
8 Data Backup Terms You Should Know
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, March 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Hackers Network Security Backup Hosted Solutions Malware Mobile Devices Google VoIP Data Email Microsoft Software Business Disaster Recovery roundup Innovation Internet nonprofit communications Business Continuity bgc User Tips Outsourced IT Managed IT Services Alert IT Services Productivity Smartphones Hardware Data Backup Tech Term Efficiency Server Browser Windows 10 Managed IT Services Smartphone Ransomware Data Recovery Saving Money Computer Workplace Tips Cloud Computing Internet of Things IT Support Android Cybercrime Computers Small Business Business Management IT Support Communication Network Windows BDR Quick Tips Artificial Intelligence Save Money Cybersecurity Productivity Office Passwords Miscellaneous Recovery Gadgets Router Managed IT Mobile Device Management Money Mobile Device Social Engineering Mobility Chrome Telephone Systems BYOD Holiday Windows 10 Applications Upgrade Law Enforcement Proactive IT Hacking Facebook Private Cloud Vulnerability Firewall Automation Health Work/Life Balance Wi-Fi Phishing Social Media Office 365 Virtualization Collaboration Bandwidth Data Protection Bring Your Own Device Office Tips Flexibility Budget Avoiding Downtime How To App Compliance Information Managed Service Provider Password Microsoft Office Remote Monitoring VPN Two-factor Authentication Google Drive Word Information Technology HaaS Save Time Remote Computing History Spam Scam Black Market Settings Sports Value Operating System Apps Voice over Internet Protocol Mobile Computing Software as a Service Keyboard Data Security Redundancy Servers Identity Theft Connectivity Safety Data Breach Business Intelligence Encryption Managed Service The Internet of Things Patch Management Legal Google Docs Blockchain Virtual Assistant Hacker Windows 7 Fraud HIPAA OneNote Risk Management Samsung Unsupported Software Charger Physical Security Telephony Data Storage Website Automobile Human Resources Telephone System Electronic Medical Records Infrastructure Paperless Office Augmented Reality IT Management Data Management Worker End of Support USB Employer-Employee Relationship Data storage Machine Learning Wireless Technology Comparison Entertainment Unified Threat Management Spam Blocking Battery Content Filtering IT Plan YouTube Update Business Owner CES Cryptocurrency Hiring/Firing SaaS Emergency Cleaning Government Training Workers PDF Big Data Solid State Drive WiFi Document Management Content Management Computing Infrastructure Credit Cards Access Control Computer Care Marketing Cortana Wire IBM Security Cameras Data Warehousing Lifestyle Accountants MSP Vendor Management Sync Wireless Charging Shadow IT Books Humor Help Desk Cast Computer Accessories Conferencing Instant Messaging Thought Leadership Mouse Assessment Mobile Users Recycling Enterprise Content Management Chromecast IT Consultant Net Neutrality Workforce Authentication Laptop Google Apps Smart Office Supercomputer Apple Botnet Best Practice Content File Sharing Fiber-Optic Hosted Solution Shortcuts Bluetooth Netflix Internet Exlporer Regulations Amazon Search Twitter Administrator Television CrashOverride Professional Services Virtual Reality eWaste Password Management Leadership ISP Frequently Asked Questions Telecommuting Politics Nanotechnology Camera Touchpad Audit NarrowBand Transportation Current Events iPhone Smartwatch Software Tips Audiobook Practices Skype Cables Public Computer Social Staff Regulation Amazon Web Services How to Addiction Meetings Worker Commute Criminal NIST User Error Cryptomining Excel Remote Work Smart Tech Printers Loyalty Computer Fan Microchip Password Manager Benefits Knowledge Downtime Employee Video Games Hosted Computing Remote Worker Going Green Wireless Start Menu Unified Communications Vendor Multi-Factor Security Digital Signature Rootkit Reputation Advertising Online Shopping Troubleshooting Cache Search Engine Data loss Monitor Colocation Database Tip of the week Scalability Experience Warranty FENG Hard Drives Education Business Mangement HVAC Smart Technology Network Congestion Robot Digital Signage HBO Specifications Inventory Wiring Windows 10s Tools Theft Wireless Internet Display Trending Customers Flash Evernote Bing Screen Mirroring Techology Safe Mode Employer Employee Relationship webinar Windows Server 2008 Devices Printer Relocation Gmail Networking Two Factor Authentication Files Google Search Outlook Millennials Public Cloud Congratulations Analytics E-Commerce Biometric Security Thank You Business Technology nonprofits GDPR