Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

With Google Chrome as its major competition, Bing needs all the help it can get just to claim a market share of the web browsing industry. Despite this, Microsoft’s search engine has encountered problems in the past with some of its top searches, including some that have caused data breaches.

What’s the Problem?
What’s the first thing that anyone who prefers Google Chrome does when they open Microsoft Edge? Simple--they download Google Chrome. Since Chrome isn’t available by default on Windows 10 devices, users have to download it, which means that they are reliant on Bing’s search results to find Google Chrome. The problem with this is that some malware sites have disguised themselves as sponsored ads for Google Chrome in Bing’s search results.

These sponsored ads would appear when a user searches for Google Chrome in the Bing search engine. Basically, instead of a legitimate sponsored ad leading to the Google Chrome download page, the malicious ad would instead bring the user to a phishing site disguised to look like the Google Chrome download page. This page would have a URL of ‘googleonline2018.com.’ If you try to access this page through Google Chrome, it’s actually blocked, but Bing and Edge don’t do this, making it a huge security issue.

These Issues Aren’t the First
Making the situation even worse is that this isn’t the first time Bing has encountered issues like this. Even as far back as April of this year, this same threat was reportedly identical to the recent version. The ad has been pulled as of this writing, but it’s strange that no explanation has been issued regarding this threat by Google, or even a confirmation that the issue has been resolved. All of these factors combine to create a situation where it’s not that unbelievable a situation like this could happen again.

Other Bing Problems
There are other problems related to Bing that have caused issues in the past, including a history of providing offensive or alarming content through its image search. For example, if you were to search for objectively neutral terms, there is a chance that, even with SafeSearch on, the image search will deliver racist search suggestions or other similarly-offensive content. Bing has also been known to push conspiracy theories through its suggested searches. Searching for the wrong thing could potentially expose users to material that they didn’t want to view in the first place, or content that could land viewers in hot water with the law.

To remain updated on similar situations to those explained above, as well as the latest security breaches and threats, subscribe to Total Tech Care’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity IT Support Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Cybersecurity Quick Tips Business Management Users Managed IT Services Upgrade Windows Phishing Data Backup Outsourced IT Ransomware Windows 10 Cloud Computing Office Server Save Money Data Recovery Windows 10 Passwords Social Media Tech Term Saving Money Gadgets Holiday Chrome Virtualization Automation Managed IT Services Microsoft Office Managed Service Computers Facebook Cybercrime Artificial Intelligence Operating System Internet of Things BYOD Mobile Device Management Health Networking Wi-Fi IT Support Hacking Information Technology Alert Managed Service Provider Remote Spam Office 365 Information Telephone Systems Covid-19 BDR Recovery Employer-Employee Relationship Bandwidth Social Engineering Mobility Router Mobile Computing Law Enforcement Application Human Resources Data Breach Password Money Big Data Remote Monitoring Encryption Applications App History Training Data Storage VPN Private Cloud Patch Management Managed IT Remote Computing Apps Mobile Office Blockchain Paperless Office How To Office Tips Government WiFi Avoiding Downtime Infrastructure Voice over Internet Protocol IT solutions Entertainment Website Gmail Budget Vulnerability Settings Windows 7 Word Two-factor Authentication Bring Your Own Device Data Management Work/Life Balance Servers Mouse HaaS Data Security Google Drive Flexibility Marketing Wireless The Internet of Things Lithium-ion battery Employee/Employer Relationship RMM Conferencing USB Scam Save Time Firewall Data Protection Virtual Reality Apple Cleaning Vendor Management Social User Error End of Support Education Meetings Physical Security Safety Telephone System Staff Software as a Service HIPAA Vendor Sports Redundancy Machine Learning Risk Management Managed Services Remote Work Keyboard Display Hacker Connectivity Hiring/Firing Identity Theft DDoS YouTube Black Market SharePoint Printer Hard Drive Bluetooth Document Management Augmented Reality Fraud Computing Solid State Drive Customer Service Wireless Technology Downtime Environment Business Intelligence How to Remote Worker Audit Worker IT Consultant Fax Server Data storage IT Management Cryptocurrency Automobile SaaS Humor Digital Signage Botnet IT Plan Comparison Computing Infrastructure Going Green Network Congestion Unsupported Software CES eWaste Procurement Charger Workplace Strategy Net Neutrality Business Technology Content Management Battery Compliance Help Desk Shadow IT Access Control OneNote Computer Care Printing Legal Virtual Assistant Current Events Wearable Technology Telephony Internet Exlporer Authentication Hard Drives Samsung Retail Virus Managed Services Provider Instant Messaging PDF Robot Excel Value Unified Threat Management Database Computer Accessories Biometrics Update Electronic Medical Records Remote Workers Virtual Desktop Proactive IT Spam Blocking Processor Best Practice Google Docs Computer Tips Experience Managed IT Service Security Cameras Mobile Administrator Science Windows 10s Devices Cast Enterprise Content Management Virtual CIO OneDrive Scalability Biometric Security Peripheral Business Owner Tip of the week MSP webinar Accountants Emergency Employer Employee Relationship Credit Cards Digital Security Cameras Distributed Denial of Service Using Data Customer Relationship Management Professional Services Microchip NarrowBand Public Cloud Thought Leadership 5G Analyitcs Password Management Assessment Password Manager Copiers Search Quick Tip Printer Server iPhone Programming Windows Server 2008 Multi-Factor Security Twitter Ergonomics Smartwatch Tools Search Engine OLED NIST Television Business Mangement Development Trending PCI DSS Antivirus Virtual Machine Files Smart Tech Windows 8 Addiction Amazon 2FA Fiber Optics Employee Chromecast IT service Cabling Public Computer Recycling Messaging Transportation Policy Hypervisor Colocation Regulations Wiring Uninterrupted Power Supply Practices Tablet Computer Fan Cache Rootkit Amazon Web Services Dark mode Trend Micro Domains Default App Monitor Safe Mode Criminal SMS Benefits Procedure Saving Time GDPR Workers Hosted Computing FENG Wireless Internet Online Shopping dark theme IaaS Shopping Maintenance Google Search IT Infrastructure Reputation Bloatware File Sharing Streaming Media IBM Consultant AI Smart Technology Specifications FinTech Content Analytics Bing Flash Camera Tech Support Inventory Tablets Wire Evernote Social Network Techology Laptop Investment Customers Entrepreneur Software Tips Supercomputer Travel Best Available Millennials WIndows 7 Employees Audiobook Employee/Employer Relationships Sync Printers Emails Smart Office Wireless Charging Windows 365 Shortcut ISP Touchpad ROI Cost Management Video Conferencing Two Factor Authentication Workforce Sales Politics Bitcoin Advertising Social Networking Shortcuts Virtual Private Network Netflix Root Cause Analysis Cables Point of Sale Personal Cryptomining HBO Notifications Knowledge Music Supply Chain Management Telecommuting User Monitoring Running Cable PowerPoint Batteries Windows Media Player Skype Project Management Nanotechnology Memory Data loss Cortana Windows 8.1 Digitize Windows Server 2008 R2 Relocation Outlook Leadership Digital Signature Troubleshooting Managing Stress Customer relationships Start Menu Warranty Screen Mirroring HVAC Loyalty Google Apps Email Best Practices IT Assessment Video Games Manufacturing Worker Commute Cameras Frequently Asked Questions Analysis Books

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code