094 90 48200     Get SUPPORT

Aniar IT Services Blog

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

With Google Chrome as its major competition, Bing needs all the help it can get just to claim a market share of the web browsing industry. Despite this, Microsoft’s search engine has encountered problems in the past with some of its top searches, including some that have caused data breaches.

What’s the Problem?
What’s the first thing that anyone who prefers Google Chrome does when they open Microsoft Edge? Simple--they download Google Chrome. Since Chrome isn’t available by default on Windows 10 devices, users have to download it, which means that they are reliant on Bing’s search results to find Google Chrome. The problem with this is that some malware sites have disguised themselves as sponsored ads for Google Chrome in Bing’s search results.

These sponsored ads would appear when a user searches for Google Chrome in the Bing search engine. Basically, instead of a legitimate sponsored ad leading to the Google Chrome download page, the malicious ad would instead bring the user to a phishing site disguised to look like the Google Chrome download page. This page would have a URL of ‘googleonline2018.com.’ If you try to access this page through Google Chrome, it’s actually blocked, but Bing and Edge don’t do this, making it a huge security issue.

These Issues Aren’t the First
Making the situation even worse is that this isn’t the first time Bing has encountered issues like this. Even as far back as April of this year, this same threat was reportedly identical to the recent version. The ad has been pulled as of this writing, but it’s strange that no explanation has been issued regarding this threat by Google, or even a confirmation that the issue has been resolved. All of these factors combine to create a situation where it’s not that unbelievable a situation like this could happen again.

Other Bing Problems
There are other problems related to Bing that have caused issues in the past, including a history of providing offensive or alarming content through its image search. For example, if you were to search for objectively neutral terms, there is a chance that, even with SafeSearch on, the image search will deliver racist search suggestions or other similarly-offensive content. Bing has also been known to push conspiracy theories through its suggested searches. Searching for the wrong thing could potentially expose users to material that they didn’t want to view in the first place, or content that could land viewers in hot water with the law.

To remain updated on similar situations to those explained above, as well as the latest security breaches and threats, subscribe to Aniar IT Services’s blog.

Tip of the Week: Three Pro Business Tips
8 Data Backup Terms You Should Know
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, December 12 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Tech Term Google Data Backup User Tips Cloud Business Computing Microsoft Email Data Recovery Hardware Data Hackers Innovation Network Security Internet VoIP Cloud Computing Malware Hosted Solutions Business Mobile Devices Android Workplace Tips Communication Managed IT Services Browser Smartphones Network IT Support IT Services Small Business Windows 10 Internet of Things Artificial Intelligence Chrome Backup Smartphone How To Communications Efficiency Windows Spam Collaboration Business Management Computer Word Cybercrime Software Information Applications BDR Computers Office 365 Cybersecurity Outsourced IT Business Continuity Saving Money Mobile Device Management Vulnerability Two-factor Authentication Data Protection Passwords Ransomware Router Productivity Facebook Money Connectivity Gadgets Data Security Managed Service Miscellaneous Server Windows 7 Social Media VPN Password Managed IT services Telephone System Spam Blocking Redundancy Voice over Internet Protocol Blockchain Telephone Systems Bring Your Own Device Social Engineering Operating System IT Management App Avoiding Downtime Phishing Software as a Service BYOD Holiday Comparison Google Drive Identity Theft Mobile Device Apps Google Docs Microsoft Office Remote Monitoring Law Enforcement IT Plan OneNote Telephony Virtual Assistant Settings Sports Scam Virtualization CES Managed IT Website Update Business Intelligence Unsupported Software Fraud Encryption Paperless Office Infrastructure Save Money Data Storage Human Resources Keyboard Upgrade Content Management Computer Care Servers Bing eWaste Thought Leadership Disaster Recovery MSP Software Tips Amazon Outlook Government Entertainment Warranty Bandwidth Skype Staff FENG Charger Hosted Computing NIST Cortana Alert Wireless Internet Travel Remote Work Unified Threat Management Patch Management HVAC Help Desk Legal Automation Tools Work/Life Balance File Sharing Amazon Web Services Accountants Wi-Fi Frequently Asked Questions Recovery Machine Learning Printer Password Manager Nanotechnology Start Menu Wireless Charging Inventory Sync Multi-Factor Security Cryptocurrency HIPAA USB Mobile Computing Augmented Reality WiFi Meetings Criminal Millennials Training Solid State Drive Excel YouTube Mouse Downtime Business Mangement Smart Tech Windows 10s Digital Signature Google Apps Safe Mode Screen Mirroring Electronic Medical Records Wire Smart Office The Internet of Things Flash Networking Shortcuts Employer-Employee Relationship Addiction Value Workforce Remote Worker Audit Physical Security Online Shopping Tip of the week Microchip Root Cause Analysis Gmail Specifications Private Cloud Credit Cards PDF Document Management Camera Workers Access Control Trending Cast Data Management Evernote Cleaning Big Data HaaS Enterprise Content Management Wiring Windows Server 2008 Search Engine Recycling Devices Public Cloud HBO Authentication Computer Fan Practices Password Management Data loss Cache Botnet Telecommuting Firewall Domains Emergency Wireless CrashOverride Windows 10 Public Speaking Presentation Managed Service Provider Compliance Lithium-ion battery Hiring/Firing Twitter Wireless Technology 5G Tech Support Regulation Quick Tips Fun IBM Safety Productivity Marketing Hacker Company Culture Budget Customer Relationship Management Competition Mobility IP Address Managing Stress Hard Drives Users Printers Search Customer Service Mobile Office