XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

With Google Chrome as its major competition, Bing needs all the help it can get just to claim a market share of the web browsing industry. Despite this, Microsoft’s search engine has encountered problems in the past with some of its top searches, including some that have caused data breaches.

What’s the Problem?
What’s the first thing that anyone who prefers Google Chrome does when they open Microsoft Edge? Simple--they download Google Chrome. Since Chrome isn’t available by default on Windows 10 devices, users have to download it, which means that they are reliant on Bing’s search results to find Google Chrome. The problem with this is that some malware sites have disguised themselves as sponsored ads for Google Chrome in Bing’s search results.

These sponsored ads would appear when a user searches for Google Chrome in the Bing search engine. Basically, instead of a legitimate sponsored ad leading to the Google Chrome download page, the malicious ad would instead bring the user to a phishing site disguised to look like the Google Chrome download page. This page would have a URL of ‘googleonline2018.com.’ If you try to access this page through Google Chrome, it’s actually blocked, but Bing and Edge don’t do this, making it a huge security issue.

These Issues Aren’t the First
Making the situation even worse is that this isn’t the first time Bing has encountered issues like this. Even as far back as April of this year, this same threat was reportedly identical to the recent version. The ad has been pulled as of this writing, but it’s strange that no explanation has been issued regarding this threat by Google, or even a confirmation that the issue has been resolved. All of these factors combine to create a situation where it’s not that unbelievable a situation like this could happen again.

Other Bing Problems
There are other problems related to Bing that have caused issues in the past, including a history of providing offensive or alarming content through its image search. For example, if you were to search for objectively neutral terms, there is a chance that, even with SafeSearch on, the image search will deliver racist search suggestions or other similarly-offensive content. Bing has also been known to push conspiracy theories through its suggested searches. Searching for the wrong thing could potentially expose users to material that they didn’t want to view in the first place, or content that could land viewers in hot water with the law.

To remain updated on similar situations to those explained above, as well as the latest security breaches and threats, subscribe to XFER’s blog.

Tip of the Week: Three Pro Business Tips
Exciting Blockchain-Fueled Applications Are Coming


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, December 14 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Managed Service Provider Business Computing Hosted Solutions Hackers Data Small Business Hardware Google Mobile Devices Productivity Mobile Office VoIP Email Gadgets Malware Quick Tips Network Security Network Efficiency Innovation IT Support Social Media Business Management Business IT Services Business Continuity Miscellaneous Server Smartphones Upgrade Virtualization Windows Communication User Tips Disaster Recovery Data Backup Communications Computer Microsoft Office Managed IT Services Users Browser Data Recovery Mobile Device Management Passwords Smartphone Android WiFi Marketing Holiday Save Money Ransomware Alert Outsourced IT Cybercrime BDR Vendor Management Tech Term Mobile Computing Chrome Operating System Remote Monitoring Windows 10 Cloud Computing Internet of Things Avoiding Downtime Bring Your Own Device Apple BYOD Information Technology Computers History Best Practice VPN Automation Spam Managed IT Services Telephone Systems Big Data Firewall Cybersecurity Remote Computing IT Solutions Router Going Green The Internet of Things Current Events Artificial Intelligence Collaboration Hacking Social Engineering Phone System Printer Facebook Employer-Employee Relationship Wireless Technology IT Consultant Trending Health Application Bandwidth Excel Money App Proactive IT Lithium-ion Battery Office Budget Windows 8 IT Support iPhone Networking Mouse Business Intelligence Content Filtering Two-factor Authentication How To Business Managament Mobility Office 365 Productivity Applications Fax Server Recovery Maintenance Windows 10 Unified Threat Management Sports Value Google Drive Information Website Managed IT Customer Relationship Management Hard Drives Training Gmail User Error Antivirus Data Protection Private Cloud Humor Blockchain Outlook Redundancy Analytics Law Enforcement Tutorials Word Mobile Device Virus Apps Encryption Data Security PowerPoint Phishing Search Tablet IT Management Save Time Administrator Tech Support Twitter Document Management Servers Office Tips Scam Vulnerability Analysis Streaming Media Risk Management Managed Service Compliance Software as a Service Flexibility Inbound Marketing Saving Time Connectivity Entertainment Settings Data Management Retail Downtime Human Resources Administration File Sharing Memory Social Networking Digital Payment Computer Repair Identity Theft Network Congestion Conferencing Voice over Internet Protocol IBM SaaS Credit Cards Piracy Machine Learning USB Online Currency Robot Leadership OneNote Recycling Data storage Point of Sale CES Education Fraud Computer Accessories eWaste Statistics IT Plan Internet Exlporer Data Storage Paperless Office PDF Keyboard Content Management Social HaaS End of Support Programming Work/Life Balance Safety Data Breach Wi-Fi Skype Government Unsupported Software YouTube Infrastructure Running Cable Augmented Reality Intranet Instant Messaging Meetings Workers Update Wearable Technology Virtual Assistant Environment Touchscreen DDoS Comparison Solid State Drive Data loss Telephony Biometrics Google Docs IT service Webinar Windows 7 Telephone System Black Market Best Available Spam Blocking Bluetooth Hacker Video Surveillance People Cleaning Password Access Control Wireless Help Desk Physical Security Public Cloud Smart Tech Samsung Criminal Camera Colocation Windows 10s HBO Cryptocurrency Science Business Owner Laptop Travel Content Filter Millennials Shadow IT Charger Cast Mobile Authentication Cortana MSP SharePoint Multi-Factor Security Smart Office Strategy Hiring/Firing Hybrid Cloud Insurance Wireless Charging Entrepreneur PC Care HIPAA Storage Scheduling IaaS Computing Infrastructure IT Security Frequently Asked Questions Safe Mode Tablets 3D Touchpad Hosted Solution Relocation Print Server Workforce HVAC Hiring/Firing eBay Macro Computer Care Legal Professional Services Nanotechnology Google Apps Remote Worker Windows Media Player Virtual Desktop Lifestyle Search Engine Co-managed IT Remote Support Flash Practices Fiber-Optic Cost Management Alerts Monitor nternet Crowdfunding Addiction Virtual Private Network Audit Tip of the week Accountants Amazon Business Technology Upgrades Analyitcs Customer Service Netflix Law Firm IT Telecommuting Enterprise Content Management Text Messaging Company Culture Tools Wiring Students Bing Consultant Gaming Console Root Cause Analysis Sync Hosted Computing Cables Proactive Work Station Reputation Cache Project Management Internet exploMicrosoft Computer Fan Windows Server 2008 Amazon Web Services Supercomputer LinkedIn Cameras Software Tips Remote Work Password Management NarrowBand Net Neutrality Devices Password Manager GDPR Healthcare Shortcuts Licensing Uninterrupted Power Supply Windows 8.1 Update Inventory Unified Communications Remote Monitoring and Maintenance Customers Wireless Internet Staff Warranty WIndows 7 Advertising FENG Display IoT Online Shopping Virtual Reality Knowledge Printer Server Shortcut Distributed Denial of Service Patch Management Files Debate NIST Chromecast Botnet Thought Leadership Business Mangement E-Commerce Emails Data Warehousing Specifications Electronic Health Records User Screen Mirroring Start Menu Theft Line of Business Worker Commute 360 Wire Digital Signature Microchip Managing Stress Domains Webcam Notifications Electronic Medical Records Regulations Evernote Bloatware Transportation Television How to Troubleshooting Webinar Techology Utility Computing Congratulations Printers Benefits Automobile Public Computer IT solutions Employer Employee Relationship CrashOverride Smart Technology Books Loyalty Experience Two Factor Authentication Content Battery Emergency Video Games Worker Music Audiobook Assessment Scalability eCommerce Rootkit Regulation Thank You Politics

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *