window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

With Google Chrome as its major competition, Bing needs all the help it can get just to claim a market share of the web browsing industry. Despite this, Microsoft’s search engine has encountered problems in the past with some of its top searches, including some that have caused data breaches.

What’s the Problem?
What’s the first thing that anyone who prefers Google Chrome does when they open Microsoft Edge? Simple--they download Google Chrome. Since Chrome isn’t available by default on Windows 10 devices, users have to download it, which means that they are reliant on Bing’s search results to find Google Chrome. The problem with this is that some malware sites have disguised themselves as sponsored ads for Google Chrome in Bing’s search results.

These sponsored ads would appear when a user searches for Google Chrome in the Bing search engine. Basically, instead of a legitimate sponsored ad leading to the Google Chrome download page, the malicious ad would instead bring the user to a phishing site disguised to look like the Google Chrome download page. This page would have a URL of ‘googleonline2018.com.’ If you try to access this page through Google Chrome, it’s actually blocked, but Bing and Edge don’t do this, making it a huge security issue.

These Issues Aren’t the First
Making the situation even worse is that this isn’t the first time Bing has encountered issues like this. Even as far back as April of this year, this same threat was reportedly identical to the recent version. The ad has been pulled as of this writing, but it’s strange that no explanation has been issued regarding this threat by Google, or even a confirmation that the issue has been resolved. All of these factors combine to create a situation where it’s not that unbelievable a situation like this could happen again.

Other Bing Problems
There are other problems related to Bing that have caused issues in the past, including a history of providing offensive or alarming content through its image search. For example, if you were to search for objectively neutral terms, there is a chance that, even with SafeSearch on, the image search will deliver racist search suggestions or other similarly-offensive content. Bing has also been known to push conspiracy theories through its suggested searches. Searching for the wrong thing could potentially expose users to material that they didn’t want to view in the first place, or content that could land viewers in hot water with the law.

To remain updated on similar situations to those explained above, as well as the latest security breaches and threats, subscribe to TaylorWorks’s blog.

Tip of the Week: Three Pro Business Tips
Exciting Blockchain-Fueled Applications Are Coming
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, December 12 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Cloud Best Practices Data Backup Privacy Business Computing Managed IT Services Hackers Hosted Solutions Data Recovery Malware Email VoIP Data Outsourced IT Innovation Mobile Devices Google Microsoft Tech Term Cloud Computing Backup User Tips Hardware Internet Business Continuity BDR Saving Money Business Internet of Things Software Communications IT Services Ransomware Cybersecurity Efficiency Android Smartphones IT Support Managed IT Services Communication Small Business Cybercrime Chrome Workplace Tips Browser Productivity IT Support Network Applications Disaster Recovery Artificial Intelligence Managed IT Gadgets How To Smartphone Business Management Computer Router Windows 10 Law Enforcement Word Save Money Business Intelligence Blockchain Computers Avoiding Downtime Office 365 Virtualization Data Security Spam Server Mobile Device Management Money Data Protection Two-factor Authentication Collaboration Information BYOD Windows Phishing Social Engineering Productivity Training Firewall Servers Remote Monitoring Analysis App Facebook Miscellaneous Upgrade Social Media IT Management Telephone Systems Redundancy Bandwidth Holiday Proactive IT Mobility Document Management Voice over Internet Protocol Connectivity Software as a Service Mobile Device Alert Passwords Compliance Encryption Vulnerability Managed Service Identity Theft Apps OneNote Budget Microsoft Office Update Paperless Office Credit Cards Access Control Scam Data Breach Big Data Employer-Employee Relationship Smart Tech Virtual Assistant Google Drive Website Human Resources Fraud Spam Blocking Automation Flexibility Solid State Drive Telephone System Data loss Password Infrastructure Mobile Computing Information Technology VPN Business Owner Google Docs Private Cloud Value Operating System Education Bring Your Own Device IT Plan Keyboard Wi-Fi Networking CES Sports Windows 7 Unified Threat Management File Sharing Work/Life Balance Comparison Workers Unsupported Software Machine Learning Telephony Data Storage Content Management Settings The Internet of Things Gmail Addiction Virtual Private Network Frequently Asked Questions Specifications Marketing Hacker IoT Password Management Business Technology Root Cause Analysis Thought Leadership Wiring Software Tips Trending webinar PDF Strategy YouTube Shortcuts Skype Evernote Audit Health Office Tips Theft Proactive Knowledge Microchip Computer Care Technology Tips Virtual Reality HaaS Recycling Cache Project Management Excel Millennials Emails NIST Black Market Content Filtering Meetings Botnet Google Apps Streaming Media Hacking GDPR Physical Security Lifestyle Conferencing Users Instant Messaging Start Menu Wireless Charging Worker Commute Remote Monitoring and Maintenance Data Warehousing WiFi Network Congestion Students HIPAA Flash Samsung Authentication Travel Downtime eWaste Wireless Internet Legal Entertainment Warranty Tip of the week Workforce Charger Insurance Cryptocurrency Battery Content Filter E-Commerce Hard Drives USB Mobile Computer Fan Line of Business Electronic Medical Records IT Consultant Staff Healthcare Remote Computing Search Engine Amazon Wireless Fiber-Optic Nanotechnology Screen Mirroring Computing Infrastructure Windows 10 Criminal Wire Printer Windows Server 2008 Telecommuting Practices Safe Mode Password Manager Storage Data Management Camera HBO Accountants HVAC Recovery Professional Services FENG MSP Leadership Public Cloud Digital Signature Electronic Health Records Bing Sync Amazon Web Services Windows 10s Cables Cast Mouse Remote Work Netflix Cortana Hosted Computing Augmented Reality Business Mangement Outlook Enterprise Content Management Tools Save Time Remote Worker Multi-Factor Security Managed Service Provider Help Desk Online Shopping SaaS Wireless Technology Unified Communications Devices Government Current Events End of Support Smart Office Risk Management Administrator Regulations Cleaning Inventory Patch Management Content Hiring/Firing Computer Accessories Music Two Factor Authentication Fun Internet exploMicrosoft Customer Relationship Management Politics Quick Tips Competition CrashOverride Audiobook Vendor Management IP Address Bluetooth Company Culture Wearable Technology eCommerce Assessment Files Transportation Advertising Customer Service Video Games Utility Computing Office Colocation Webinar Mobile Office Books Domains Automobile Managing Stress How to Television History Benefits Search Relocation Best Practice IT solutions Regulation Techology Public Speaking Worker Troubleshooting Public Computer Smart Technology Scalability Loyalty Humor Presentation Internet Exlporer Lithium-ion battery Emergency User Error Twitter Printers Rootkit Shadow IT Hosted Solution Employer Employee Relationship Hybrid Cloud Tech Support Experience 5G IBM Safety

Mobile? Grab this Article!

QR-Code dieser Seite