XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

With Google Chrome as its major competition, Bing needs all the help it can get just to claim a market share of the web browsing industry. Despite this, Microsoft’s search engine has encountered problems in the past with some of its top searches, including some that have caused data breaches.

What’s the Problem?
What’s the first thing that anyone who prefers Google Chrome does when they open Microsoft Edge? Simple--they download Google Chrome. Since Chrome isn’t available by default on Windows 10 devices, users have to download it, which means that they are reliant on Bing’s search results to find Google Chrome. The problem with this is that some malware sites have disguised themselves as sponsored ads for Google Chrome in Bing’s search results.

These sponsored ads would appear when a user searches for Google Chrome in the Bing search engine. Basically, instead of a legitimate sponsored ad leading to the Google Chrome download page, the malicious ad would instead bring the user to a phishing site disguised to look like the Google Chrome download page. This page would have a URL of ‘googleonline2018.com.’ If you try to access this page through Google Chrome, it’s actually blocked, but Bing and Edge don’t do this, making it a huge security issue.

These Issues Aren’t the First
Making the situation even worse is that this isn’t the first time Bing has encountered issues like this. Even as far back as April of this year, this same threat was reportedly identical to the recent version. The ad has been pulled as of this writing, but it’s strange that no explanation has been issued regarding this threat by Google, or even a confirmation that the issue has been resolved. All of these factors combine to create a situation where it’s not that unbelievable a situation like this could happen again.

Other Bing Problems
There are other problems related to Bing that have caused issues in the past, including a history of providing offensive or alarming content through its image search. For example, if you were to search for objectively neutral terms, there is a chance that, even with SafeSearch on, the image search will deliver racist search suggestions or other similarly-offensive content. Bing has also been known to push conspiracy theories through its suggested searches. Searching for the wrong thing could potentially expose users to material that they didn’t want to view in the first place, or content that could land viewers in hot water with the law.

To remain updated on similar situations to those explained above, as well as the latest security breaches and threats, subscribe to XFER’s blog.

Tip of the Week: Three Pro Business Tips
Exciting Blockchain-Fueled Applications Are Coming
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Managed Service Provider Hosted Solutions Data Hackers Google Small Business Mobile Devices Hardware VoIP Productivity Mobile Office Gadgets Network Security Malware Email Quick Tips Efficiency Network Innovation IT Support Business Management IT Services Social Media Business Smartphones Business Continuity Server Miscellaneous Upgrade Virtualization Communication User Tips Disaster Recovery Communications Windows Data Backup Computer Microsoft Office Managed IT Services Users Data Recovery Smartphone Mobile Device Management Passwords Browser Android Holiday Marketing Internet of Things Save Money WiFi Ransomware Outsourced IT Alert Tech Term Cloud Computing Vendor Management Artificial Intelligence Mobile Computing BDR Cybercrime Windows 10 Router Productivity Operating System Chrome Remote Monitoring Cybersecurity Bring Your Own Device Apple BYOD Information Technology Computers Avoiding Downtime Automation Big Data Remote Computing Firewall IT Solutions Going Green The Internet of Things Health Current Events Collaboration VPN Best Practice Telephone Systems History Spam Managed IT Services Employer-Employee Relationship Printer Facebook IT Consultant Trending Application Hacking Phone System Social Engineering Proactive IT Wireless Technology Office Mobile Device Mobility Budget Windows 10 IT Support Bandwidth Money Excel App Lithium-ion Battery Applications Content Filtering Encryption How To Two-factor Authentication Business Managament Phishing Unified Threat Management Recovery Fax Server Maintenance Windows 8 Private Cloud iPhone Training Networking Mouse Office 365 Business Intelligence User Error Settings Analytics Humor Outlook Access Control File Sharing Apps Google Drive Tutorials Virus PowerPoint Managed IT Information Sports Value Data Protection Save Time Blockchain Customer Relationship Management Word Website Hard Drives Redundancy Law Enforcement Antivirus Data Security Gmail Saving Time Entertainment Voice over Internet Protocol Administration Retail Downtime IT Management Human Resources Digital Payment Servers Memory Social Networking Computer Repair Network Congestion Hacker Conferencing Machine Learning Software as a Service Search Administrator Tablet Analysis Twitter Wi-Fi Managed Service Document Management Vulnerability Streaming Media Risk Management Tech Support Office Tips Connectivity Data Management Inbound Marketing Scam Compliance Social Identity Theft Flexibility Black Market Workers Augmented Reality Intranet Touchscreen Healthcare Instant Messaging Running Cable Wearable Technology Wireless Physical Security Credit Cards Environment Cleaning Password Telephone System Data loss Net Neutrality Public Cloud SaaS Biometrics IT service Display Video Surveillance Fraud Best Available Spam Blocking Smart Tech CES Bluetooth Data storage IT Plan Webinar People Content Management eWaste Piracy Samsung Internet Exlporer IBM Help Desk Unsupported Software PDF Leadership Infrastructure USB Online Currency HaaS End of Support Robot Safety OneNote Update Recycling Government Computer Accessories Paperless Office Point of Sale YouTube Education Meetings Data Storage Business Technology Comparison Keyboard Telephony Statistics Google Docs DDoS Work/Life Balance Data Breach Windows 7 Programming Skype Solid State Drive Virtual Assistant Botnet Root Cause Analysis Gaming Console Devices Data Warehousing GDPR Specifications Company Culture Advertising Work Station Co-managed IT Password Management Start Menu Theft Customer Service File Versioning Law Firm IT Inventory Remote Monitoring and Maintenance Digital Signature Consultant Distributed Denial of Service Files Supercomputer Regulations Shortcuts Evernote Smartwatch Chromecast Computer Fan Wireless Internet HBO Warranty LinkedIn IoT Travel Criminal Thought Leadership E-Commerce Millennials Notifications NIST Mobile Cortana Cameras Multiple Versions Line of Business Multi-Factor Security Strategy Licensing Windows 8.1 Update Colocation Knowledge Electronic Health Records eCommerce Wireless Charging Employee Laptop FENG WIndows 7 SharePoint Wire Frequently Asked Questions Microchip Virtual Reality Shadow IT Patch Management Restore Data Debate Screen Mirroring Content Filter Camera Workforce 360 Hybrid Cloud Emails Cryptocurrency Professional Services Google Apps Printer Server Shortcut Authentication MSP Lifestyle User IaaS Computing Infrastructure Flash Vendor Fiber-Optic Worker Commute Digital Signage Touchpad Electronic Medical Records Webcam Managing Stress Domains Business Owner Relocation Smart Office Tip of the week Amazon Bloatware Legal Windows 10s Insurance Backup and Disaster Recovery Monitor Charger Cast Storage Telecommuting Science Safe Mode Tools Nanotechnology Remote Worker HIPAA PC Care HVAC Sync Security Cameras Cables Google Search Hiring/Firing Practices 3D Windows Server 2008 Search Engine Amazon Web Services Entrepreneur Scheduling IT Security Reputation Computer Care eBay Addiction Software Tips Virtual Private Network Remote Work Tablets Hosted Solution Accountants Password Manager Wiring Hiring/Firing Internet exploMicrosoft Alerts Enterprise Content Management Employee/Employer Relationship Unified Communications Windows Media Player Virtual Desktop ISP Print Server Hosted Computing Proactive Staff Remote Support Students Bing Online Shopping Cost Management nternet Crowdfunding NarrowBand Audit Customers Text Messaging Cache Project Management Upgrades Analyitcs Uninterrupted Power Supply Netflix Macro Business Mangement Experience Content Two Factor Authentication Scalability Emergency Worker Music Audiobook How to Assessment Techology Regulation Rootkit Politics Television Utility Computing Transportation Printers Troubleshooting Webinar Thank You Automobile Public Computer Benefits Cryptomining IT solutions Employer Employee Relationship Battery CrashOverride Congratulations Smart Technology Video Games Loyalty Books

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *