Infracore LLC Blog

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

With Google Chrome as its major competition, Bing needs all the help it can get just to claim a market share of the web browsing industry. Despite this, Microsoft’s search engine has encountered problems in the past with some of its top searches, including some that have caused data breaches.

What’s the Problem?
What’s the first thing that anyone who prefers Google Chrome does when they open Microsoft Edge? Simple--they download Google Chrome. Since Chrome isn’t available by default on Windows 10 devices, users have to download it, which means that they are reliant on Bing’s search results to find Google Chrome. The problem with this is that some malware sites have disguised themselves as sponsored ads for Google Chrome in Bing’s search results.

These sponsored ads would appear when a user searches for Google Chrome in the Bing search engine. Basically, instead of a legitimate sponsored ad leading to the Google Chrome download page, the malicious ad would instead bring the user to a phishing site disguised to look like the Google Chrome download page. This page would have a URL of ‘googleonline2018.com.’ If you try to access this page through Google Chrome, it’s actually blocked, but Bing and Edge don’t do this, making it a huge security issue.

These Issues Aren’t the First
Making the situation even worse is that this isn’t the first time Bing has encountered issues like this. Even as far back as April of this year, this same threat was reportedly identical to the recent version. The ad has been pulled as of this writing, but it’s strange that no explanation has been issued regarding this threat by Google, or even a confirmation that the issue has been resolved. All of these factors combine to create a situation where it’s not that unbelievable a situation like this could happen again.

Other Bing Problems
There are other problems related to Bing that have caused issues in the past, including a history of providing offensive or alarming content through its image search. For example, if you were to search for objectively neutral terms, there is a chance that, even with SafeSearch on, the image search will deliver racist search suggestions or other similarly-offensive content. Bing has also been known to push conspiracy theories through its suggested searches. Searching for the wrong thing could potentially expose users to material that they didn’t want to view in the first place, or content that could land viewers in hot water with the law.

To remain updated on similar situations to those explained above, as well as the latest security breaches and threats, subscribe to Infracore LLC’s blog.

Tip of the Week: Three Pro Business Tips
8 Data Backup Terms You Should Know
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, December 11 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Network Security Business computing Google Malware Hosted Solutions Hackers Microsoft Software Innovation Data Business Hardware Internet Smartphones User Tips Tech Term Backup Business Continuity Browser Email Windows 10 Data Backup Mobile Devices Computer VoIP Android Small Business Outsourced IT Managed IT Services Smartphone Business Management Cloud Computing Alert Workplace Tips Productivity Communications Data Recovery IT Services Ransomware Managed IT Services Miscellaneous Chrome Office Efficiency Computers Disaster Recovery Communication Cybercrime Network Artificial Intelligence Law Enforcement Telephone Systems Collaboration Cybersecurity Office 365 Internet of Things Windows 10 Password Applications Productivity Facebook Virtualization Money Windows How To Passwords Social Media IT Support Router Google Drive App Holiday Quick Tips Saving Money Upgrade Spam Health Work/Life Balance Information Gadgets Social Engineering Server Word Microsoft Office Automation Connectivity Hacking Keyboard Vulnerability Wi-Fi Scam Data Breach BDR Mobile Device Management Mobile Device Apps Data Protection Private Cloud Voice over Internet Protocol HaaS Phishing Office Tips Bring Your Own Device Data Security Managed Service Two-factor Authentication Save Money IT Support Unsupported Software Virtual Assistant Update Remote Computing Firewall Networking Identity Theft Remote Monitoring Infrastructure Encryption Flexibility Managed IT Employer-Employee Relationship Charger Telephone System Telephony Sports End of Support Legal Patch Management Windows 7 VPN History Software as a Service Mobility Automobile Settings Human Resources BYOD Cleaning Google Docs Fraud Data Storage Worker Data Management PDF Big Data Comparison Computer Care Website CES OneNote IT Management Redundancy Avoiding Downtime Servers Managed Service Provider Spam Blocking Marketing Government Samsung Content Management Electronic Medical Records Paperless Office IT Plan Training Bandwidth Battery Entertainment Operating System Business Intelligence Public Cloud USB Value Blockchain webinar Vendor Management eWaste The Internet of Things Wire Printer Hosted Computing Education Humor Internet Exlporer Screen Mirroring Bluetooth Enterprise Content Management Cache Windows 10s Emergency Windows Server 2008 Public Computer Unified Threat Management Millennials Black Market Files Evernote Hybrid Cloud Troubleshooting HBO Loyalty MSP Multi-Factor Security HIPAA Data storage Root Cause Analysis Save Time YouTube Help Desk Conferencing Software Tips WiFi Criminal Scalability FENG Smart Technology Current Events Mouse Credit Cards Inventory Computing Infrastructure Cast Password Management Password Manager Mobile Computing Workforce Wireless Charging Devices Apple Outlook SaaS File Sharing Trending Wireless Botnet Emails Experience Two Factor Authentication Skype Knowledge Smart Office Administrator Access Control Internet exploMicrosoft Risk Management NIST Business Mangement Best Practice Solid State Drive Flash Camera Accountants Shortcuts Cortana Thought Leadership iPhone Frequently Asked Questions Augmented Reality Staff Meetings Hiring/Firing Travel Advertising Music Information Technology Start Menu Network Congestion Document Management Microchip Amazon Techology Authentication Users Politics Rootkit Cryptocurrency Gmail Content Audit Transportation Safety Telecommuting Relocation User Error Employer Employee Relationship Google Apps Books Excel Assessment Remote Worker Specifications Search IT solutions Wearable Technology Physical Security Instant Messaging Monitor Tools IT Consultant Search Engine Amazon Web Services Nanotechnology Virtual Reality Safe Mode Recovery Recycling Video Games Audiobook Computer Fan Benefits Sync Wireless Internet Warranty Remote Work Practices Data loss Computer Accessories HVAC Workers Addiction Tip of the week Television Wiring Digital Signature How to Smart Tech Worker Commute Downtime Leadership Machine Learning Bing Online Shopping Company Culture Compliance Thank You Managing Stress Webinar Regulation Congratulations Printers Twitter CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Phillip Bond A Checklist of 40 Microsoft Software Titles Reaching End of Life/Extended Support in July 2016
11 December 2018
A checklist of the components is done for the widening of the elements. The scope of the check list ...
Erickson Ferry Tip of the Week: Useful Shortcuts for Google
30 November 2018
Your blog was too good. I was exceptionally satisfied to discover this site. I needed to thank you f...
Alex Ling Would Your Users be Tricked by Social Engineering?
27 November 2018
I came to know about the user that was tricked by the users in this community this was all on social...
Daniel Mcmahon Ancient Greek Computer in Serious Need of Firmware Update
23 November 2018
Computers which are imported from the Greek now want to update the all software that is firmware tra...
Cameran Moon Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
22 November 2018
Infra core was the heart of IT they told us that if we download a wrong application it will infect o...