DatCom Blog

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

With Google Chrome as its major competition, Bing needs all the help it can get just to claim a market share of the web browsing industry. Despite this, Microsoft’s search engine has encountered problems in the past with some of its top searches, including some that have caused data breaches.

What’s the Problem?
What’s the first thing that anyone who prefers Google Chrome does when they open Microsoft Edge? Simple--they download Google Chrome. Since Chrome isn’t available by default on Windows 10 devices, users have to download it, which means that they are reliant on Bing’s search results to find Google Chrome. The problem with this is that some malware sites have disguised themselves as sponsored ads for Google Chrome in Bing’s search results.

These sponsored ads would appear when a user searches for Google Chrome in the Bing search engine. Basically, instead of a legitimate sponsored ad leading to the Google Chrome download page, the malicious ad would instead bring the user to a phishing site disguised to look like the Google Chrome download page. This page would have a URL of ‘googleonline2018.com.’ If you try to access this page through Google Chrome, it’s actually blocked, but Bing and Edge don’t do this, making it a huge security issue.

These Issues Aren’t the First
Making the situation even worse is that this isn’t the first time Bing has encountered issues like this. Even as far back as April of this year, this same threat was reportedly identical to the recent version. The ad has been pulled as of this writing, but it’s strange that no explanation has been issued regarding this threat by Google, or even a confirmation that the issue has been resolved. All of these factors combine to create a situation where it’s not that unbelievable a situation like this could happen again.

Other Bing Problems
There are other problems related to Bing that have caused issues in the past, including a history of providing offensive or alarming content through its image search. For example, if you were to search for objectively neutral terms, there is a chance that, even with SafeSearch on, the image search will deliver racist search suggestions or other similarly-offensive content. Bing has also been known to push conspiracy theories through its suggested searches. Searching for the wrong thing could potentially expose users to material that they didn’t want to view in the first place, or content that could land viewers in hot water with the law.

To remain updated on similar situations to those explained above, as well as the latest security breaches and threats, subscribe to DatCom’s blog.

Tip of the Week: Three Pro Business Tips
8 Data Backup Terms You Should Know
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, February 21 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Google Hosted Solutions User Tips Hackers Microsoft Tech Term Software Backup Malware Mobile Devices Internet Business Innovation Smartphones Productivity Data Data Backup Communications Hardware Workplace Tips VoIP Email Small Business Data Recovery Smartphone IT Services Business Continuity Android Cloud Computing Router Cybersecurity Computer Communication Disaster Recovery Managed IT Services Ransomware Network Artificial Intelligence Browser Law Enforcement Efficiency Internet of Things Windows 10 Alert IT Support Chrome Outsourced IT Windows 10 Cybercrime Miscellaneous Server Gadgets How To Applications Mobile Device Business Management Computers Office 365 Password Money Collaboration Windows Wi-Fi Passwords Managed IT Services Telephone Systems Information Virtualization Holiday Word Saving Money Social Media Productivity BDR Spam Facebook Social Engineering Avoiding Downtime Private Cloud Settings Office Mobile Device Management Work/Life Balance Keyboard Operating System Encryption Phishing Microsoft Office App BYOD Connectivity Voice over Internet Protocol Save Money Government Managed Service Data Security Flexibility Apps Two-factor Authentication Mobility Data Protection Quick Tips Vulnerability Health Data Storage Content Management Data Management Google Docs Legal Bandwidth OneNote End of Support HaaS Employer-Employee Relationship IT Management Comparison Blockchain Redundancy Identity Theft Public Cloud Website Servers Scam Networking Office Tips Entertainment Remote Monitoring Infrastructure Paperless Office Google Drive Human Resources Spam Blocking Upgrade Machine Learning VPN IT Plan Business Intelligence Remote Computing Virtual Assistant Fraud Access Control Managed IT Botnet Update Bring Your Own Device Telephony Automation Unsupported Software Telephone System CES Windows 7 Software as a Service Data Breach Sports Apple Amazon Web Services Nanotechnology Camera Leadership Wearable Technology Trending NIST Hacker Solid State Drive Flash How to Augmented Reality Meetings Training Recycling Document Management Managing Stress Shortcuts Frequently Asked Questions Patch Management Remote Work Practices Audiobook Start Menu Politics Workers Computing Infrastructure Smart Office Microchip Net Neutrality PDF Current Events iPhone Techology Online Shopping Smart Tech Addiction USB Samsung Marketing Video Games Cryptocurrency Smartwatch Audit Hosted Computing Recovery Remote Worker eWaste Best Practice Save Time Social Excel Instant Messaging Tools Internet exploMicrosoft History Search Engine Physical Security Big Data FCC Electronic Medical Records Evernote IT Support Cache Warranty Value Wireless Specifications Safe Mode Employee Computer Fan Sync Credit Cards Inventory Wiring Knowledge Data loss Experience Charger Users Hybrid Cloud Criminal HVAC Vendor Tip of the week IBM Downtime HIPAA Password Manager Virtual Reality Bing Netflix Title II The Internet of Things Wireless Charging Wireless Internet Printer webinar Staff Digital Signage Devices Unified Threat Management Network Congestion Screen Mirroring Cleaning Information Technology Hacking Enterprise Content Management Display Windows 10s Windows Server 2008 Supercomputer MSP Root Cause Analysis Budget Business Mangement Worker Commute YouTube Help Desk HBO Online Accountants FENG Hiring/Firing Cortana Battery Wire Mouse Conferencing Millennials Scalability Google Search Amazon Authentication Black Market Thought Leadership Mobile Computing IT Consultant Cast Music Computer Care Multi-Factor Security Automobile Password Management Security Cameras Search File Sharing Advertising WiFi Gmail Company Culture Outlook Telecommuting Proactive IT Skype Risk Management Internet Exlporer Travel Google Apps Education Administrator Emails Software Tips Firewall Workforce Digital Signature Content Two Factor Authentication Twitter Regulation ISP Computer Accessories Webinar Content Filtering Assessment Printers Vendor Management Safety CrashOverride Bluetooth IT solutions Television Managed Service Provider Troubleshooting Shadow IT Transportation Books Public Computer Loyalty Wireless Technology Benefits Worker Hosted Solution SaaS Smart Technology Rootkit Business Owner Emergency Compliance Employer Employee Relationship