k_Street Consulting, LLC Blog

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

With Google Chrome as its major competition, Bing needs all the help it can get just to claim a market share of the web browsing industry. Despite this, Microsoft’s search engine has encountered problems in the past with some of its top searches, including some that have caused data breaches.

What’s the Problem?
What’s the first thing that anyone who prefers Google Chrome does when they open Microsoft Edge? Simple--they download Google Chrome. Since Chrome isn’t available by default on Windows 10 devices, users have to download it, which means that they are reliant on Bing’s search results to find Google Chrome. The problem with this is that some malware sites have disguised themselves as sponsored ads for Google Chrome in Bing’s search results.

These sponsored ads would appear when a user searches for Google Chrome in the Bing search engine. Basically, instead of a legitimate sponsored ad leading to the Google Chrome download page, the malicious ad would instead bring the user to a phishing site disguised to look like the Google Chrome download page. This page would have a URL of ‘googleonline2018.com.’ If you try to access this page through Google Chrome, it’s actually blocked, but Bing and Edge don’t do this, making it a huge security issue.

These Issues Aren’t the First
Making the situation even worse is that this isn’t the first time Bing has encountered issues like this. Even as far back as April of this year, this same threat was reportedly identical to the recent version. The ad has been pulled as of this writing, but it’s strange that no explanation has been issued regarding this threat by Google, or even a confirmation that the issue has been resolved. All of these factors combine to create a situation where it’s not that unbelievable a situation like this could happen again.

Other Bing Problems
There are other problems related to Bing that have caused issues in the past, including a history of providing offensive or alarming content through its image search. For example, if you were to search for objectively neutral terms, there is a chance that, even with SafeSearch on, the image search will deliver racist search suggestions or other similarly-offensive content. Bing has also been known to push conspiracy theories through its suggested searches. Searching for the wrong thing could potentially expose users to material that they didn’t want to view in the first place, or content that could land viewers in hot water with the law.

To remain updated on similar situations to those explained above, as well as the latest security breaches and threats, subscribe to k_Street Consulting, LLC’s blog.

Tip of the Week: Three Pro Business Tips
Exciting Blockchain-Fueled Applications Are Coming


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, May 23 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

File Sharing Wireless Charging Healthcare Mobile Disaster Recovery Gaming Console Touchscreen Hackers Virtual Private Network Miscellaneous Staff IT Support Windows 10 Automation Hosted Solutions Encryption Online Shopping People Applications Theft Read Specifications PDF Gmail Audiobook Best Practices NIST Efficiency SharePoint Managed Service Provider Flash Settings Cloud Computing Samsung Wi-Fi Start Menu Microchip Monitor Telephony Work/Life Balance Benefits Evernote Recovery User Tips Help Desk Vulnerability Maintenance IT Services Password IT Consultant Comparison Uninterrupted Power Supply Access Control Augmented Reality Website Public Cloud Retail Redundancy Archive Google Search Google Drive Utility Computing IBM Employee Software Laptop Analysis Experience Business Technology Word Router Remote Work Business Intelligence Loyalty Workplace Tips Tech Term Bloatware Two Factor Authentication Virtual Reality Cabling Cryptomining Servers Politics BYOD Content Management Information Technology Credit Cards Insurance Data loss Humor Project Management IT Solutions Software Tips Camera Music App Logistics 5G Conferencing Content Filter Frequently Asked Questions BDR Information Internet exploMicrosoft Digital Signage Application Black Market Thank You Default App Telephone System Save Time Analyitcs Remote Worker Quick Tips Physical Security Money Employer Employee Relationship Net Neutrality Marketing Multiple Versions Business Continuity Wearable Technology File Versioning Battery Bandwidth Office Tips DDoS Patch Management Statistics Windows Media Player HBO Video Games Productivity Computer Repair Hybrid Cloud Strategy Botnet Data Storage Data Security Email OLED Tip of the Week Manufacturing Computing Infrastructure Digital Payment Virus Millennials Cables Printer Server Screen Mirroring Government Apps Hosted Computing Browser Phishing Data Protection Best Practice Techology Sports IT solutions Printer Antivirus Virtualization Big data Network Spam Network Congestion Advertising Windows Server 2008 End of Support Point of Sale Unified Communications Fax Server Windows 8 FENG IT Support Remote Monitoring and Maintenance Security Cameras Microsoft Office LinkedIn Tip of the week Backup and Disaster Recovery Proactive IT Computer Fan Vendor Management Mobile Device Private Cloud ISP Trending How to Hacker Computer Care Lithium-ion battery Smartwatch Printers Bing VoIP Innovation Windows 10s Electronic Health Records Cast Saving Time Tech Support Thought Leadership Human Resources IoT Leadership Social Media Alert Electronic Medical Records Remote Computing Managing Stress Business Management Best Available Facebook Risk Management CrashOverride USB Shortcut Update Hosted Solution Books Criminal Wireless Technology Spam Blocking Biometric Security How To Vendor Windows 7 SaaS Business Owner Mobile Device Management Outsourced IT Hardware Search Windows 10 Customer Service Online Currency Public Computer Operating Systems Content Managed IT Services Wiring Chromecast Practices Upgrade Password Management Touchpad Apple Mobile Office Machine Learning Security Connectivity Education Internet YouTube Knowledge Phone System Cleaning Users User Technology GDPR Data Recovery Fraud IT service Training webinar Devices Amazon Web Services WIndows 7 Hiring/Firing Lifestyle Fiber-Optic Data Product Reviews Search Engine Bluetooth Social Engineering Enterprise Content Management Hacking E-Commerce Bring Your Own Device Computer Meetings Twitter Google CES Addiction Restore Data Smartphone Pain Points Collaboration Social Networking HaaS Ransomware Cameras Telecommuting Mobile Devices Shortcuts Business Computing Downtime eWaste Mobility Troubleshooting Managed Service Reputation Authentication HIPAA Instant Messaging Passwords Firewall Streaming Media Office Administrator The Internet of Things Robot Congratulations Display Emergency Social Charger Cybersecurity Office 365 Internet Exlporer Wire Privacy Smart Technology Digital Signature Programming Biometrics Tablet Inventory Artificial Intelligence Blockchain Emails Backup Tablets Content Filtering Virtual Assistant Infrastructure Hring/Firing Audit Automobile NarrowBand Supercomputer Colocation Safety Wireless eCommerce travel Save Money Document Management PowerPoint Tools Legal Database Compliance Customers IT Plan History Mobile Computing Distribution Cache Multi-Factor Security Flexibility Smart Office Entertainment Productivity Regulations Recycling Administration Consultant Managed IT Sync Microsoft Two-factor Authentication Server Distributed Denial of Service iphone Regulation Domains Going Green User Error Budget Outlook Scam WiFi avoiding downtime Law Enforcement Television Hard Drives Google Docs Cloud Webinar Cryptocurrency Workers Internet of Things Business Amazon Running Cable Holiday Transportation Data storage Accountants Chrome VPN Solid State Drive Virtual Desktop Software as a Service malware Wireless Internet Managed IT Services Warranty Proactive IT Management Memory Saving Money Root Cause Analysis Worker Small Business Smartphones Value Gadgets Remote Monitoring Employer-Employee Relationship Password Manager HVAC Current Events Nanotechnology Environment Assessment Storage Analytic MSP Notifications Worker Commute Paperless Office Voice over Internet Protocol Rootkit OneNote IaaS Netflix Shadow IT Networking Google Apps Customer Relationship Management Scalability Keyboard Data Backup Data Breach Science Operating System Line of Business Students Workforce Windows Unified Threat Management analytics Files Identity Theft Computer Accessories Computers Unsupported Software Cortana Relocation Network Security Communication Skype Professional Services communications Cost Management Telephone Systems Data Warehousing Company Culture Mouse Smart Tech Cybercrime Employee/Employer Relationship Intranet Data Management Safe Mode Excel Business Mangement Android Health Entrepreneur

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *