k_Street Consulting, LLC Blog

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

With Google Chrome as its major competition, Bing needs all the help it can get just to claim a market share of the web browsing industry. Despite this, Microsoft’s search engine has encountered problems in the past with some of its top searches, including some that have caused data breaches.

What’s the Problem?
What’s the first thing that anyone who prefers Google Chrome does when they open Microsoft Edge? Simple--they download Google Chrome. Since Chrome isn’t available by default on Windows 10 devices, users have to download it, which means that they are reliant on Bing’s search results to find Google Chrome. The problem with this is that some malware sites have disguised themselves as sponsored ads for Google Chrome in Bing’s search results.

These sponsored ads would appear when a user searches for Google Chrome in the Bing search engine. Basically, instead of a legitimate sponsored ad leading to the Google Chrome download page, the malicious ad would instead bring the user to a phishing site disguised to look like the Google Chrome download page. This page would have a URL of ‘googleonline2018.com.’ If you try to access this page through Google Chrome, it’s actually blocked, but Bing and Edge don’t do this, making it a huge security issue.

These Issues Aren’t the First
Making the situation even worse is that this isn’t the first time Bing has encountered issues like this. Even as far back as April of this year, this same threat was reportedly identical to the recent version. The ad has been pulled as of this writing, but it’s strange that no explanation has been issued regarding this threat by Google, or even a confirmation that the issue has been resolved. All of these factors combine to create a situation where it’s not that unbelievable a situation like this could happen again.

Other Bing Problems
There are other problems related to Bing that have caused issues in the past, including a history of providing offensive or alarming content through its image search. For example, if you were to search for objectively neutral terms, there is a chance that, even with SafeSearch on, the image search will deliver racist search suggestions or other similarly-offensive content. Bing has also been known to push conspiracy theories through its suggested searches. Searching for the wrong thing could potentially expose users to material that they didn’t want to view in the first place, or content that could land viewers in hot water with the law.

To remain updated on similar situations to those explained above, as well as the latest security breaches and threats, subscribe to k_Street Consulting, LLC’s blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, February 21 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Printer BDR Unified Communications Wi-Fi Search Utility Computing Virus Business Continuity Business Customer Service communications Thought Leadership Employee History User Tips Cache Distributed Denial of Service Mobility Technology VPN Hard Drives Managed Service Wiring Education Amazon Skype Browser Microsoft Settings Healthcare Techology Internet Exlporer Marketing Data Recovery Android Safety Vendor Management Botnet analytics Credit Cards Wire Insurance eCommerce Cryptocurrency Update Proactive Software as a Service Fax Server Office Tips Email Data loss Facebook Upgrade Software Tips Books Computers Risk Management Touchscreen Hosted Solution Running Cable Health Quick Tips Remote Monitoring Printers Workers Cloud USB Windows Server 2008 Mouse Millennials Managed IT Services Two Factor Authentication Windows 10 Black Market Public Cloud Customers Advertising Smart Tech eWaste IBM Students Notifications Start Menu Knowledge Customer Relationship Management Colocation MSP Saving Time Root Cause Analysis Content Comparison Loyalty Augmented Reality Mobile SharePoint Data Security Worker Shortcuts Wireless Charging Lifestyle Microsoft Office Telephone System Security WiFi Unsupported Software Flash Scam Efficiency Social Networking Telephone Systems Google Docs Budget Tools Antivirus Cortana Cast Security Cameras Sports Backup and Disaster Recovery Specifications Workforce Worker Commute Humor Excel Vendor Employer-Employee Relationship iphone Hosted Computing Passwords Troubleshooting Redundancy Mobile Office NarrowBand FENG Bloatware Business Intelligence Physical Security Bluetooth Administration Best Available Shadow IT Science Warranty Internet YouTube avoiding downtime Cybersecurity Tip of the week Hybrid Cloud Alert Mobile Computing Entertainment Windows 10 Video Games Cables Tablets Remote Monitoring and Maintenance Robot Electronic Medical Records Small Business IT Solutions Infrastructure Social Ransomware Value Emails Storage Smartwatch Amazon Web Services Twitter Blockchain Emergency Virtualization How to ISP Windows 8 Internet of Things Netflix Hosted Solutions Voice over Internet Protocol Webinar Virtual Private Network Meetings CES Thank You Practices Assessment The Internet of Things IT solutions Employer Employee Relationship Digital Signature People Two-factor Authentication Programming Benefits Human Resources Environment Workplace Tips Downtime Supercomputer Password Management Product Reviews Apple Identity Theft Samsung Tech Term Word Work/Life Balance Holiday IT Services Uninterrupted Power Supply Machine Learning Automobile IT Plan Addiction Reputation Big data Monitor LinkedIn Files Regulation Streaming Media Music CrashOverride Wireless Internet Bing Lithium-ion battery Hacker Criminal Website Display Privacy Computer Care Managed IT Services Intranet Unified Threat Management Phishing Television Cleaning Audit Staff Cybercrime webinar Router Net Neutrality Data storage Leadership Windows Media Player Office IT service Restore Data User Error IT Consultant Best Practice IaaS Password Manager Archive Innovation Company Culture Applications Statistics Vulnerability Employee/Employer Relationship Instant Messaging Server Hardware Backup Wireless Technology Cameras Administrator Retail Audiobook Computer Digital Signage Tech Support Connectivity VoIP Devices Servers Data Protection Flexibility Online Currency Apps Frequently Asked Questions Line of Business Transportation Managed Service Provider Hackers Social Media Scalability Accountants Money Telephony Access Control Touchpad Microchip Miscellaneous Virtual Reality Outlook Managed IT Computing Infrastructure Internet exploMicrosoft Consultant Windows 10s Multiple Versions End of Support Patch Management Save Money Maintenance IT Support Google Drive Disaster Recovery Document Management Save Time Recycling Data Congratulations Content Filter Mobile Device Operating System Multi-Factor Security Windows 7 BYOD Remote Computing Charger Shortcut IoT Analytic Telecommuting File Versioning Application Trending Best Practices Point of Sale Social Engineering Digital Payment Spam HaaS HIPAA Network Congestion Business Technology PowerPoint Pain Points Office 365 Google Enterprise Content Management E-Commerce GDPR Business Mangement Encryption Sync Chromecast User Information Content Filtering Virtual Assistant Firewall Wireless Inventory Paperless Office Hacking Operating Systems Read Recovery WIndows 7 Data Breach Biometrics Spam Blocking Content Management Productivity Safe Mode Communication Search Engine Google Search Windows travel Mobile Devices Fraud Regulations Data Storage DDoS Solid State Drive Computer Accessories Rootkit Hiring/Firing Mobile Device Management App Memory NIST Smartphones Private Cloud Users Business Management Analysis Network Security Authentication Going Green How To Relocation Cost Management Networking Productivity Artificial Intelligence IT Support Smart Technology Public Computer Computer Repair Battery File Sharing Hring/Firing Government Information Technology Legal Strategy Entrepreneur Fiber-Optic SaaS Screen Mirroring Smartphone Project Management Managing Stress Tip of the Week Theft Gaming Console Saving Money Evernote Outsourced IT Collaboration Electronic Health Records Bandwidth Tablet HBO Printer Server Wearable Technology HVAC Computer Fan Training Law Enforcement Analyitcs Password Smart Office Professional Services Business Computing IT Management Phone System Bring Your Own Device Online Shopping Domains PDF Proactive IT malware Data Backup Network Compliance Help Desk Camera Gmail Business Owner Data Warehousing Software Experience Data Management Google Apps Automation Conferencing Cloud Computing Virtual Desktop Gadgets Politics Keyboard Chrome OneNote Remote Work Nanotechnology Remote Worker Current Events Laptop

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *