window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

With Google Chrome as its major competition, Bing needs all the help it can get just to claim a market share of the web browsing industry. Despite this, Microsoft’s search engine has encountered problems in the past with some of its top searches, including some that have caused data breaches.

What’s the Problem?
What’s the first thing that anyone who prefers Google Chrome does when they open Microsoft Edge? Simple--they download Google Chrome. Since Chrome isn’t available by default on Windows 10 devices, users have to download it, which means that they are reliant on Bing’s search results to find Google Chrome. The problem with this is that some malware sites have disguised themselves as sponsored ads for Google Chrome in Bing’s search results.

These sponsored ads would appear when a user searches for Google Chrome in the Bing search engine. Basically, instead of a legitimate sponsored ad leading to the Google Chrome download page, the malicious ad would instead bring the user to a phishing site disguised to look like the Google Chrome download page. This page would have a URL of ‘googleonline2018.com.’ If you try to access this page through Google Chrome, it’s actually blocked, but Bing and Edge don’t do this, making it a huge security issue.

These Issues Aren’t the First
Making the situation even worse is that this isn’t the first time Bing has encountered issues like this. Even as far back as April of this year, this same threat was reportedly identical to the recent version. The ad has been pulled as of this writing, but it’s strange that no explanation has been issued regarding this threat by Google, or even a confirmation that the issue has been resolved. All of these factors combine to create a situation where it’s not that unbelievable a situation like this could happen again.

Other Bing Problems
There are other problems related to Bing that have caused issues in the past, including a history of providing offensive or alarming content through its image search. For example, if you were to search for objectively neutral terms, there is a chance that, even with SafeSearch on, the image search will deliver racist search suggestions or other similarly-offensive content. Bing has also been known to push conspiracy theories through its suggested searches. Searching for the wrong thing could potentially expose users to material that they didn’t want to view in the first place, or content that could land viewers in hot water with the law.

To remain updated on similar situations to those explained above, as well as the latest security breaches and threats, subscribe to TaylorWorks’s blog.

Tip of the Week: Three Pro Business Tips
Exciting Blockchain-Fueled Applications Are Coming
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, February 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Privacy Hosted Solutions Managed IT Services Data Backup Hackers Malware Data Recovery VoIP Mobile Devices Email Data Google Outsourced IT User Tips Internet of Things Innovation Tech Term Microsoft Communications Cloud Computing Backup Productivity Internet Business Continuity IT Services Hardware Software Efficiency Artificial Intelligence Saving Money BDR Business Cybersecurity Communication Small Business Ransomware Smartphones Managed IT Services Router Cybercrime Disaster Recovery Android IT Support Smartphone IT Support Network Business Management Applications Windows 10 Gadgets Browser Chrome Workplace Tips Computer Mobile Device Phishing Law Enforcement Managed IT How To Mobility Money Word Business Intelligence Collaboration Blockchain Access Control Windows BYOD Data Security Save Money Computers Office 365 Avoiding Downtime Data Protection Information Spam Virtualization Mobile Device Management Encryption Holiday Two-factor Authentication Proactive IT Server Passwords Document Management Alert Servers Apps Productivity Analysis Vulnerability Compliance Settings Training Firewall Social Engineering IT Management Redundancy Miscellaneous Upgrade Remote Monitoring App Voice over Internet Protocol Social Media Facebook Connectivity Software as a Service Automation Private Cloud Telephone Systems Machine Learning Managed Service Identity Theft Wi-Fi Bandwidth Business Technology Keyboard Update Paperless Office Unified Threat Management Credit Cards Networking Botnet Work/Life Balance Workers Smart Tech Virtual Assistant Hacker Save Time Budget Human Resources Fraud Microsoft Office Data loss OneNote Telephone System Big Data Infrastructure Mobile Computing VPN Health Google Docs Healthcare Scam Website Employer-Employee Relationship Data Breach Google Drive IT Plan Spam Blocking CES Sports Solid State Drive Windows 7 File Sharing Flexibility Information Technology Comparison Password Unsupported Software Value Operating System Telephony Business Owner Data Storage Content Management Education Bring Your Own Device Data Management Gmail Addiction Virtual Private Network Frequently Asked Questions Specifications Recovery IoT Password Management FENG Security Cameras Root Cause Analysis Theft Thought Leadership Leadership Public Cloud Wiring Software Tips Trending Strategy YouTube Windows 10s Shortcuts Skype Evernote Augmented Reality Proactive Netflix Cortana Microchip Wireless Technology Recycling Cache Project Management Excel Millennials NIST Employee/Employer Relationship Meetings Google Apps Streaming Media Managed Service Provider GDPR Physical Security Lifestyle Marketing SaaS eCommerce Start Menu Wireless Charging The Internet of Things End of Support Remote Monitoring and Maintenance Data Warehousing WiFi Risk Management Students Cleaning Flash Patch Management Authentication Current Events Travel eWaste Wireless Internet Warranty Tip of the week Workforce Insurance Cryptocurrency Smartwatch Content Filter webinar PDF E-Commerce Audit Office Tips Social Mobile Knowledge Line of Business Users Staff Computer Care Technology Tips Search Engine Amazon Virtual Reality Fiber-Optic Nanotechnology Employee Screen Mirroring Criminal Wire Emails Printer Windows Server 2008 Telecommuting Black Market Content Filtering Practices Safe Mode HaaS Password Manager Storage Conferencing Camera HBO Instant Messaging Accountants HVAC Vendor Professional Services Hacking Network Congestion MSP HIPAA Digital Signature Electronic Health Records Samsung Bing Sync Amazon Web Services Worker Commute Cables Digital Signage Cast Legal Entertainment Charger Mouse Remote Work Battery Wireless Hosted Computing Downtime Windows 10 Business Mangement Hard Drives Outlook USB Enterprise Content Management Computer Fan Display Tools Devices Electronic Medical Records IT Consultant Remote Worker Multi-Factor Security Remote Computing Help Desk Online Shopping Unified Communications Google Search Government Smart Office Administrator Regulations Inventory Computing Infrastructure Worker Troubleshooting Lithium-ion battery Public Computer Techology Scalability Loyalty Humor Smart Technology Internet Exlporer Net Neutrality Tech Support Emergency 5G IBM Rootkit Shadow IT Hosted Solution Safety User Error Employer Employee Relationship Hybrid Cloud Experience Company Culture ISP Utility Computing Content Customer Relationship Management Hiring/Firing Competition Computer Accessories Music IP Address Managing Stress Fun Internet exploMicrosoft Politics Quick Tips Two Factor Authentication Audiobook Customer Service Vendor Management CrashOverride Regulation Bluetooth Wearable Technology Mobile Office Assessment Files Advertising Video Games Office Transportation Domains Webinar Books Colocation Automobile Twitter Printers How to Television History Search Relocation Benefits Public Speaking Best Practice IT solutions Presentation

Mobile? Grab this Article!

QR-Code dieser Seite