window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORTLunch & Learn

TaylorWorks Blog

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

With Google Chrome as its major competition, Bing needs all the help it can get just to claim a market share of the web browsing industry. Despite this, Microsoft’s search engine has encountered problems in the past with some of its top searches, including some that have caused data breaches.

What’s the Problem?
What’s the first thing that anyone who prefers Google Chrome does when they open Microsoft Edge? Simple--they download Google Chrome. Since Chrome isn’t available by default on Windows 10 devices, users have to download it, which means that they are reliant on Bing’s search results to find Google Chrome. The problem with this is that some malware sites have disguised themselves as sponsored ads for Google Chrome in Bing’s search results.

These sponsored ads would appear when a user searches for Google Chrome in the Bing search engine. Basically, instead of a legitimate sponsored ad leading to the Google Chrome download page, the malicious ad would instead bring the user to a phishing site disguised to look like the Google Chrome download page. This page would have a URL of ‘googleonline2018.com.’ If you try to access this page through Google Chrome, it’s actually blocked, but Bing and Edge don’t do this, making it a huge security issue.

These Issues Aren’t the First
Making the situation even worse is that this isn’t the first time Bing has encountered issues like this. Even as far back as April of this year, this same threat was reportedly identical to the recent version. The ad has been pulled as of this writing, but it’s strange that no explanation has been issued regarding this threat by Google, or even a confirmation that the issue has been resolved. All of these factors combine to create a situation where it’s not that unbelievable a situation like this could happen again.

Other Bing Problems
There are other problems related to Bing that have caused issues in the past, including a history of providing offensive or alarming content through its image search. For example, if you were to search for objectively neutral terms, there is a chance that, even with SafeSearch on, the image search will deliver racist search suggestions or other similarly-offensive content. Bing has also been known to push conspiracy theories through its suggested searches. Searching for the wrong thing could potentially expose users to material that they didn’t want to view in the first place, or content that could land viewers in hot water with the law.

To remain updated on similar situations to those explained above, as well as the latest security breaches and threats, subscribe to TaylorWorks’s blog.

Tip of the Week: Three Pro Business Tips
Exciting Blockchain-Fueled Applications Are Coming
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, May 24 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Privacy Data Backup Hosted Solutions Managed IT Services Email Malware Hackers Data Recovery Productivity Internet Data Innovation User Tips VoIP Mobile Devices Google Microsoft Communications Outsourced IT Internet of Things Efficiency IT Services Tech Term Cloud Computing Software Cybersecurity Backup Hardware Communication Business Business Continuity Artificial Intelligence Small Business BDR IT Support Saving Money Smartphones Business Management Android Workplace Tips Ransomware Disaster Recovery Gadgets Managed IT Services Smartphone Windows 10 Router Mobile Device Cybercrime IT Support Network Phishing Chrome Browser Collaboration Applications Server Training BYOD Computer How To Windows Encryption Law Enforcement Spam Managed IT Business Intelligence Passwords Data Security Holiday Avoiding Downtime Mobility Users Data Protection Office 365 Information Virtualization Proactive IT Social Media Mobile Device Management Money Save Money Word Computers Blockchain Access Control Two-factor Authentication Manufacturing Servers Analysis Apps Social Engineering Productivity Telephone Systems IT Management Education Redundancy Automation App Remote Monitoring Facebook Operating System Document Management Connectivity Voice over Internet Protocol Miscellaneous File Sharing Bandwidth Software as a Service Upgrade Machine Learning Compliance Private Cloud Managed Service Firewall Identity Theft Business Technology Vulnerability Alert Paperless Office Settings Wi-Fi Virtual Assistant Update Smart Tech Credit Cards OneNote Augmented Reality Meetings Botnet Human Resources Telephone System Cryptocurrency Fraud Data Breach Hacker Health VPN Infrastructure Data loss Budget Remote Computing Staff Healthcare Mobile Computing Spam Blocking Microsoft Office Business Owner Employer-Employee Relationship Google Docs Bring Your Own Device Google Drive Big Data Keyboard Value Website Cables CES IT Plan Solid State Drive Sports Flexibility Information Technology Windows 7 Password Work/Life Balance Display Comparison Save Time Help Desk Content Management Unsupported Software Unified Threat Management Wireless Telephony Networking Data Storage Government Workers Virtual Private Network Virtual Reality Scam Employee/Employer Relationship Recycling Cache Black Market Content Filtering Project Management NIST webinar Instant Messaging GDPR Cryptomining Excel Millennials Audit Hacking eCommerce Managed Service Provider Google Apps Streaming Media HIPAA Remote Monitoring and Maintenance ISP Physical Security Students Lifestyle Computer Care Wireless Technology 5G Worker Commute End of Support Authentication Start Menu Wireless Charging Knowledge Smartwatch eWaste Data Warehousing Wireless Internet WiFi Vendor Management Emails Battery Warranty Biometric Security Insurance Flash Legal Entertainment Conferencing Marketing USB E-Commerce Database Tip of the week Office Tips Workforce The Internet of Things Social PDF Content Filter Travel Line of Business File Versioning Technology Tips Quick Tips Samsung Search Engine Fiber-Optic Nanotechnology Mobile Network Congestion Employee Criminal Wire Charger Printer OLED Practices HaaS Safe Mode Amazon Downtime Storage Recovery Camera Accountants Windows Server 2008 HVAC Telecommuting Computer Fan Data Management Vendor Password Manager Screen Mirroring MSP Multiple Versions Digital Signature HBO Electronic Health Records Bing Professional Services Electronic Medical Records IT Consultant Digital Signage Mouse Cabling Hosted Computing Sync Amazon Web Services Hard Drives Business Mangement Cast Distribution Enterprise Content Management Remote Work FENG Leadership Remote Worker Restore Data Outlook Windows 10s Unified Communications Devices Tools Risk Management Google Search Smart Office Multi-Factor Security Netflix Patch Management Administrator Default App Computing Infrastructure Inventory Online Shopping Security Cameras Gmail Addiction Logistics IoT Regulations Password Management Windows 10 Wiring Backup and Disaster Recovery Strategy Frequently Asked Questions YouTube Specifications SaaS Shortcuts Theft Root Cause Analysis Public Cloud Thought Leadership Proactive Net Neutrality Cortana Software Tips Trending Cleaning Microchip Skype Evernote Current Events Lithium-ion battery User Error Audiobook Computer Accessories Wearable Technology Company Culture Hybrid Cloud Tech Support Video Games Transportation Utility Computing Two Factor Authentication Hiring/Firing Safety Books CrashOverride IBM Bluetooth How to Managing Stress Assessment Automobile Benefits Fun Internet exploMicrosoft Best Practice Regulation Webinar Competition Customer Relationship Management IP Address Troubleshooting Analytics Files Television Scalability Office Smart Technology Advertising IT solutions Emergency Colocation Customer Service Twitter Worker Mobile Office Shadow IT Hosted Solution Printers History Public Computer Experience Relocation Loyalty Domains Search Rootkit Techology Content Employer Employee Relationship Music Humor Public Speaking Politics Presentation Internet Exlporer

Mobile? Grab this Article!

QR-Code dieser Seite