Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

With Google Chrome as its major competition, Bing needs all the help it can get just to claim a market share of the web browsing industry. Despite this, Microsoft’s search engine has encountered problems in the past with some of its top searches, including some that have caused data breaches.

What’s the Problem?
What’s the first thing that anyone who prefers Google Chrome does when they open Microsoft Edge? Simple--they download Google Chrome. Since Chrome isn’t available by default on Windows 10 devices, users have to download it, which means that they are reliant on Bing’s search results to find Google Chrome. The problem with this is that some malware sites have disguised themselves as sponsored ads for Google Chrome in Bing’s search results.

These sponsored ads would appear when a user searches for Google Chrome in the Bing search engine. Basically, instead of a legitimate sponsored ad leading to the Google Chrome download page, the malicious ad would instead bring the user to a phishing site disguised to look like the Google Chrome download page. This page would have a URL of ‘googleonline2018.com.’ If you try to access this page through Google Chrome, it’s actually blocked, but Bing and Edge don’t do this, making it a huge security issue.

These Issues Aren’t the First
Making the situation even worse is that this isn’t the first time Bing has encountered issues like this. Even as far back as April of this year, this same threat was reportedly identical to the recent version. The ad has been pulled as of this writing, but it’s strange that no explanation has been issued regarding this threat by Google, or even a confirmation that the issue has been resolved. All of these factors combine to create a situation where it’s not that unbelievable a situation like this could happen again.

Other Bing Problems
There are other problems related to Bing that have caused issues in the past, including a history of providing offensive or alarming content through its image search. For example, if you were to search for objectively neutral terms, there is a chance that, even with SafeSearch on, the image search will deliver racist search suggestions or other similarly-offensive content. Bing has also been known to push conspiracy theories through its suggested searches. Searching for the wrong thing could potentially expose users to material that they didn’t want to view in the first place, or content that could land viewers in hot water with the law.

To remain updated on similar situations to those explained above, as well as the latest security breaches and threats, subscribe to Total Tech Care’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Upgrade Phishing Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Server Save Money Cloud Computing Data Recovery Office Passwords Windows 10 Tech Term Chrome Virtualization Social Media Saving Money Holiday Gadgets Microsoft Office Automation Managed IT Services Managed Service Artificial Intelligence Operating System Facebook Computers Cybercrime IT Support Wi-Fi Hacking BYOD Internet of Things Health Mobile Device Management Networking Spam Managed Service Provider Office 365 Telephone Systems Remote Information Technology Information Covid-19 Alert Social Engineering Mobility Router BDR Recovery Employer-Employee Relationship Bandwidth Remote Monitoring Password Big Data Money Encryption App History Applications Mobile Computing Data Breach Law Enforcement Application Human Resources Managed IT How To Mobile Office Apps Data Storage Patch Management Office Tips Training Government VPN Blockchain Paperless Office Private Cloud Remote Computing Infrastructure Mouse HaaS Bring Your Own Device Voice over Internet Protocol Data Management Work/Life Balance Flexibility Vulnerability Google Drive Wireless Windows 7 Marketing Word WiFi Gmail IT solutions Entertainment Avoiding Downtime Website Servers Settings Budget Two-factor Authentication Data Security Social Employee/Employer Relationship RMM Cleaning User Error Meetings End of Support Data Protection Education Physical Security Risk Management Hacker Conferencing Safety Sports HIPAA Scam Redundancy The Internet of Things Lithium-ion battery Keyboard Vendor Management Vendor USB Telephone System Firewall Staff Software as a Service Managed Services Display Machine Learning Connectivity Remote Work Virtual Reality Save Time Apple Samsung Hard Drive Data storage Network Congestion Identity Theft Automobile eWaste Value Computing Computing Infrastructure Augmented Reality Going Green Spam Blocking Electronic Medical Records Fraud Wearable Technology Hiring/Firing Remote Worker Retail Hard Drives Battery Instant Messaging Cryptocurrency Shadow IT Robot Excel Digital Signage Legal Virus Biometrics Internet Exlporer Virtual Desktop Unified Threat Management Comparison Computer Accessories Business Intelligence Procurement PDF DDoS CES Workplace Strategy Net Neutrality Worker Audit IT Management Help Desk SharePoint Business Technology Proactive IT Content Management Printing Access Control Botnet Printer Best Practice IT Plan Bluetooth Virtual Assistant YouTube Customer Service Managed Services Provider Black Market Authentication Environment Unsupported Software Fax Server Database Charger Remote Workers Document Management IT Consultant Solid State Drive SaaS Wireless Technology Update Compliance Computer Care Processor How to Downtime OneNote Humor Current Events Telephony Google Docs Peripheral Administrator Devices Bloatware Root Cause Analysis Uninterrupted Power Supply HBO Digital Security Cameras Knowledge Using Data Music Colocation Enterprise Content Management 5G MSP Accountants Consultant Skype Tablets Copiers Quick Tip Microchip Monitor Thought Leadership Credit Cards Entrepreneur Analytics Data loss Password Manager Outlook Ergonomics Leadership Troubleshooting Smartwatch Password Management OLED Shortcut Best Available Start Menu Multi-Factor Security Development Screen Mirroring PCI DSS Loyalty Virtual Machine Search Engine Reputation Twitter WIndows 7 Streaming Media Cost Management Tech Support Business Mangement Social Networking Frequently Asked Questions 2FA Fiber Optics Content Books Employee NIST Cabling Techology Laptop Smart Tech Mobile Trending Windows 10s Messaging Cast Policy Hypervisor Customers Addiction Amazon Running Cable Recycling Tip of the week Dark mode webinar Trend Micro Audiobook Emergency Employer Employee Relationship Default App Wiring Touchpad Practices Professional Services Memory Public Cloud SMS Amazon Web Services PowerPoint Procedure Windows Media Player Assessment Saving Time Cache User Advertising Safe Mode Criminal Windows Server 2008 dark theme Shopping Politics Google Search IT Infrastructure GDPR Hosted Computing Tools AI Notifications Online Shopping FinTech Television Bing Wireless Internet Managing Stress File Sharing Science Social Network Investment Camera Inventory Specifications Cameras Evernote Employees Public Computer Employee/Employer Relationships Relocation Wire Distributed Denial of Service Customer Relationship Management Regulations Windows 365 Travel Transportation ISP Rootkit ROI Video Games Printers Millennials Analyitcs Computer Fan Video Conferencing Wireless Charging Programming Sales Bitcoin Worker Commute Shortcuts Smart Office Point of Sale Workers Personal Experience Benefits Cryptomining Scalability Virtual Private Network Workforce Printer Server FENG Supply Chain Management Cables Monitoring IBM Batteries Business Owner Antivirus NarrowBand Flash Windows 8.1 Windows 8 Digitize Smart Technology Windows Server 2008 R2 Search Project Management Nanotechnology IT service Telecommuting Cortana Software Tips Customer relationships Supercomputer iPhone Digital Signature Sync Email Best Practices Tablet Emails IT Assessment Manufacturing Warranty Domains Google Apps Computer Tips Managed IT Service Security Cameras Files HVAC IaaS Chromecast Analysis Maintenance Virtual CIO Netflix OneDrive Two Factor Authentication Biometric Security

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code