Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

With Google Chrome as its major competition, Bing needs all the help it can get just to claim a market share of the web browsing industry. Despite this, Microsoft’s search engine has encountered problems in the past with some of its top searches, including some that have caused data breaches.

What’s the Problem?
What’s the first thing that anyone who prefers Google Chrome does when they open Microsoft Edge? Simple--they download Google Chrome. Since Chrome isn’t available by default on Windows 10 devices, users have to download it, which means that they are reliant on Bing’s search results to find Google Chrome. The problem with this is that some malware sites have disguised themselves as sponsored ads for Google Chrome in Bing’s search results.

These sponsored ads would appear when a user searches for Google Chrome in the Bing search engine. Basically, instead of a legitimate sponsored ad leading to the Google Chrome download page, the malicious ad would instead bring the user to a phishing site disguised to look like the Google Chrome download page. This page would have a URL of ‘googleonline2018.com.’ If you try to access this page through Google Chrome, it’s actually blocked, but Bing and Edge don’t do this, making it a huge security issue.

These Issues Aren’t the First
Making the situation even worse is that this isn’t the first time Bing has encountered issues like this. Even as far back as April of this year, this same threat was reportedly identical to the recent version. The ad has been pulled as of this writing, but it’s strange that no explanation has been issued regarding this threat by Google, or even a confirmation that the issue has been resolved. All of these factors combine to create a situation where it’s not that unbelievable a situation like this could happen again.

Other Bing Problems
There are other problems related to Bing that have caused issues in the past, including a history of providing offensive or alarming content through its image search. For example, if you were to search for objectively neutral terms, there is a chance that, even with SafeSearch on, the image search will deliver racist search suggestions or other similarly-offensive content. Bing has also been known to push conspiracy theories through its suggested searches. Searching for the wrong thing could potentially expose users to material that they didn’t want to view in the first place, or content that could land viewers in hot water with the law.

To remain updated on similar situations to those explained above, as well as the latest security breaches and threats, subscribe to Total Tech Care’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 23 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Business Management Users Windows Upgrade Phishing Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Server Save Money Cloud Computing Office Windows 10 Passwords Gadgets Chrome Tech Term Virtualization Social Media Saving Money Holiday Managed IT Services Microsoft Office Managed Service Automation Operating System Artificial Intelligence Facebook Computers Cybercrime Networking Internet of Things IT Support Hacking Wi-Fi BYOD Health Mobile Device Management Covid-19 Managed Service Provider Spam Alert Information Office 365 Telephone Systems Remote Information Technology Bandwidth BDR Social Engineering Mobility Recovery Employer-Employee Relationship Router Law Enforcement Remote Monitoring Big Data Password Money App History Encryption Mobile Computing Applications Data Breach Application Human Resources Remote Computing Blockchain Private Cloud Paperless Office Mobile Office How To Managed IT Apps Office Tips Data Storage Patch Management Training VPN Government Two-factor Authentication Avoiding Downtime Data Security Mouse HaaS Bring Your Own Device Data Management Work/Life Balance Infrastructure Voice over Internet Protocol Flexibility Wireless Vulnerability Marketing Windows 7 WiFi Word IT solutions Gmail Google Drive Entertainment Website Budget Settings Servers Managed Services Virtual Reality Display Apple Social Staff Employee/Employer Relationship Software as a Service Telephone System User Error Save Time Machine Learning RMM Meetings Connectivity Remote Work Cleaning Risk Management Hacker Conferencing End of Support The Internet of Things Education Physical Security Lithium-ion battery Scam Safety Data Protection HIPAA Sports Redundancy USB Firewall Keyboard Vendor Management Vendor SaaS YouTube Charger Remote Workers Black Market Content Management Business Technology Humor Access Control Compliance OneNote Processor Computer Care Current Events Network Congestion Virtual Assistant eWaste Document Management Telephony Authentication Solid State Drive Hard Drive Wireless Technology Samsung Downtime How to Value Computing Data storage Update Wearable Technology Automobile Spam Blocking Electronic Medical Records Retail Hard Drives Instant Messaging Google Docs Robot Computing Infrastructure Excel Hiring/Firing Identity Theft Virus Going Green Biometrics Digital Signage Virtual Desktop Unified Threat Management Computer Accessories Battery Augmented Reality DDoS Shadow IT Fraud Procurement Legal Business Intelligence Workplace Strategy SharePoint Remote Worker Net Neutrality Audit Internet Exlporer Worker Help Desk IT Management Cryptocurrency Printer Printing Bluetooth Botnet Customer Service PDF Environment IT Plan Comparison Fax Server Managed Services Provider Proactive IT CES Unsupported Software Database Best Practice IT Consultant Experience Wire Windows Server 2008 R2 Tablet Evernote Supercomputer Travel Customer relationships Domains Scalability Software Tips Email Best Practices Business Owner Sync Printers IT Assessment Emails Manufacturing Millennials IaaS Maintenance Smart Office NarrowBand Wireless Charging Managed IT Service Bloatware Security Cameras Computer Tips Search Virtual CIO Virtual Private Network OneDrive iPhone Netflix Biometric Security Two Factor Authentication Workforce Consultant Peripheral Root Cause Analysis Tablets Cables Using Data Entrepreneur Knowledge Music Digital Security Cameras HBO Analytics Skype Project Management Copiers Files Nanotechnology 5G Telecommuting Best Available Quick Tip Shortcut Data loss Chromecast Cortana Cost Management Leadership Digital Signature Smartwatch Troubleshooting WIndows 7 Ergonomics Outlook Start Menu Warranty Development Social Networking Colocation OLED Uninterrupted Power Supply PCI DSS Screen Mirroring HVAC Virtual Machine Loyalty Google Apps Fiber Optics Monitor Analysis Employee Books 2FA Frequently Asked Questions Running Cable Mobile Administrator Messaging Windows 10s Devices Cabling Policy Cast Enterprise Content Management Hypervisor Memory Dark mode Tip of the week MSP PowerPoint Trend Micro Reputation webinar Accountants Windows Media Player Streaming Media Emergency User Content Professional Services Microchip SMS Public Cloud Thought Leadership Default App Tech Support Employer Employee Relationship Credit Cards Saving Time Laptop Assessment Password Manager Procedure Techology Password Management dark theme Windows Server 2008 Shopping Customers Google Search Multi-Factor Security Managing Stress Audiobook Tools Search Engine AI Twitter IT Infrastructure Science Touchpad Television Business Mangement Bing FinTech NIST Cameras Social Network Smart Tech Trending Distributed Denial of Service Politics Customer Relationship Management Advertising Addiction Investment Amazon Employee/Employer Relationships Analyitcs Public Computer Recycling Employees Windows 365 Regulations Wiring Programming Practices ISP Notifications Transportation Video Conferencing Computer Fan Cache ROI Rootkit Amazon Web Services Bitcoin Criminal Shortcuts Sales Safe Mode Printer Server Point of Sale Antivirus GDPR Personal Relocation Workers Hosted Computing Cryptomining Benefits Supply Chain Management FENG Wireless Internet Windows 8 Online Shopping Batteries IBM Monitoring IT service Video Games File Sharing Windows 8.1 Worker Commute Flash Camera Digitize Inventory Smart Technology Specifications

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code