DatCom Blog

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

With Google Chrome as its major competition, Bing needs all the help it can get just to claim a market share of the web browsing industry. Despite this, Microsoft’s search engine has encountered problems in the past with some of its top searches, including some that have caused data breaches.

What’s the Problem?
What’s the first thing that anyone who prefers Google Chrome does when they open Microsoft Edge? Simple--they download Google Chrome. Since Chrome isn’t available by default on Windows 10 devices, users have to download it, which means that they are reliant on Bing’s search results to find Google Chrome. The problem with this is that some malware sites have disguised themselves as sponsored ads for Google Chrome in Bing’s search results.

These sponsored ads would appear when a user searches for Google Chrome in the Bing search engine. Basically, instead of a legitimate sponsored ad leading to the Google Chrome download page, the malicious ad would instead bring the user to a phishing site disguised to look like the Google Chrome download page. This page would have a URL of ‘googleonline2018.com.’ If you try to access this page through Google Chrome, it’s actually blocked, but Bing and Edge don’t do this, making it a huge security issue.

These Issues Aren’t the First
Making the situation even worse is that this isn’t the first time Bing has encountered issues like this. Even as far back as April of this year, this same threat was reportedly identical to the recent version. The ad has been pulled as of this writing, but it’s strange that no explanation has been issued regarding this threat by Google, or even a confirmation that the issue has been resolved. All of these factors combine to create a situation where it’s not that unbelievable a situation like this could happen again.

Other Bing Problems
There are other problems related to Bing that have caused issues in the past, including a history of providing offensive or alarming content through its image search. For example, if you were to search for objectively neutral terms, there is a chance that, even with SafeSearch on, the image search will deliver racist search suggestions or other similarly-offensive content. Bing has also been known to push conspiracy theories through its suggested searches. Searching for the wrong thing could potentially expose users to material that they didn’t want to view in the first place, or content that could land viewers in hot water with the law.

To remain updated on similar situations to those explained above, as well as the latest security breaches and threats, subscribe to DatCom’s blog.

Tip of the Week: Three Pro Business Tips
8 Data Backup Terms You Should Know


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, December 16 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Network Security Microsoft Hackers Business Computing User Tips Hosted Solutions Software Tech Term Malware Google Internet Business Innovation Data Backup Backup Hardware Data Email Smartphones Mobile Devices Small Business Communications VoIP Business Continuity Android Data Recovery Workplace Tips Ransomware Managed IT Services Smartphone Computer Cloud Computing Network Cybersecurity Browser IT Services Chrome Alert Outsourced IT Communication Law Enforcement Cybercrime Disaster Recovery Windows 10 Windows 10 Applications Business Management Internet of Things Server Efficiency Router How To Office 365 Money Collaboration Computers Password Windows IT Support Productivity Artificial Intelligence Miscellaneous Spam Facebook Passwords Virtualization Information Gadgets BDR Word Saving Money Telephone Systems Social Media Managed IT Services Productivity Work/Life Balance Voice over Internet Protocol Office Microsoft Office BYOD Two-factor Authentication Mobile Device Management Mobile Device Save Money Connectivity Holiday Flexibility Apps Data Protection Managed Service Operating System Phishing Government App Mobility Data Security Social Engineering Avoiding Downtime Wi-Fi Quick Tips Keyboard Vulnerability Health HaaS Remote Monitoring Human Resources Upgrade Data Storage Servers VPN Entertainment Paperless Office Business Intelligence Settings Private Cloud End of Support Fraud OneNote Update Employer-Employee Relationship IT Management Redundancy Office Tips Public Cloud Remote Computing Bring Your Own Device Managed IT CES Virtual Assistant Google Drive Spam Blocking Data Breach Content Management Telephone System Google Docs IT Plan Software as a Service Bandwidth Sports Comparison Blockchain Data Management Website Unsupported Software Legal Identity Theft Telephony Infrastructure Encryption Windows 7 Scam Networking Smart Office Specifications Microchip Outlook Advertising Video Games Big Data Evernote Recovery Electronic Medical Records Addiction Criminal Emails Software Tips Internet Exlporer Best Practice Value Cryptocurrency Credit Cards Inventory Skype Remote Worker Password Manager Leadership Apple History Experience Charger Title II Solid State Drive Flash Instant Messaging IBM Meetings IT Support HIPAA Search Engine Staff Frequently Asked Questions Wireless Charging Cache Warranty Safe Mode Access Control Start Menu Supercomputer Wiring Business Mangement iPhone Techology Virtual Reality Cleaning HVAC Online Accountants Audit Marketing Budget Machine Learning Millennials Bing Excel Cortana Hiring/Firing Wireless Internet Multi-Factor Security Printer Physical Security Internet exploMicrosoft Hacking Amazon Authentication Tools Devices WiFi Unified Threat Management Gmail Worker Commute Music Computer Care Enterprise Content Management Telecommuting Computer Fan Sync Wireless MSP Google Apps Knowledge Data loss Battery YouTube Workforce Help Desk Digital Signature Tip of the week Users Hybrid Cloud Scalability Travel Black Market Risk Management Wire Trending Mouse Netflix Automobile Firewall Amazon Web Services Nanotechnology Downtime Thought Leadership Mobile Computing Recycling webinar Wearable Technology Password Management Remote Work Practices The Internet of Things Search File Sharing Workers Network Congestion Screen Mirroring Education Training Company Culture Net Neutrality PDF Windows 10s Windows Server 2008 Information Technology Content Patch Management Politics Administrator HBO Online Shopping Smart Tech Root Cause Analysis Botnet How to Current Events Camera eWaste Conferencing Automation Document Management USB Samsung NIST Hosted Computing FENG Augmented Reality IT Consultant Cast Computing Infrastructure Managing Stress FCC Shortcuts Audiobook Bluetooth Television Regulation Printers Save Time Troubleshooting Transportation Books Public Computer Shadow IT Webinar Loyalty Benefits Safety Worker IT solutions Wireless Technology Hosted Solution SaaS CrashOverride Smart Technology Managed Service Provider Rootkit Emergency Employer Employee Relationship Two Factor Authentication Business Owner Computer Accessories Content Filtering Assessment Compliance Twitter Vendor Management