Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Bing Offers Malware and Filth

Bing Offers Malware and Filth

With a meager market share that is one-third the size of Google’s, one would think that Bing would be trying to keep controversy away from a user’s search results. However, the Microsoft search engine has recently encountered a few notable PR disasters that may be enough to convince some not to use it - especially if it leads to a security breach.

What is Going On
Considering the difference in the market shares of Microsoft Edge and Google Chrome (4.24 percent compared to 67.66 percent, respectively), it should come as no surprise that the first thing that many owners of a Windows 10 device do is to use Edge to download Chrome. Naturally, Edge defaults to Bing to conduct these searches. However, these searches have taken to delivering disguised malware sites as sponsored ads for Google Chrome within these search results.

When the user searches Bing to find the download link for Chrome, there is the chance that, instead of a sponsored result popping up from Google, one will pop up that only appears to be from Google at first glance. However, once clicked on, this link brings a user to a phishing site disguised to look like the Google Chrome download page, with the URL ‘googleonline2018.com.’ Trying to access this site through Chrome itself results in the user finding it to be blocked, while Bing and Edge do no such thing.

Not a New Problem
Making this situation even worse, this is not the first time that Bing has had this issue. Back in April of this year, this threat was reported as effectively identical to this recent version - and while the advertisement has been pulled, there has been no explanation of how it could appear to come from google.com, or if this issue had been resolved.

This means that it is entirely likely that this issue will pop up once again.

Other Bing Issues
Of course, this isn’t the only problematic element of the Bing search engine. Its search function has a history of delivering highly offensive and alarming content, especially through its image search. Searches for what are objectively neutral terms would deliver back inflammatory results, even with SafeSearch on. Similar things happen when you search for other terms as well. In addition to racist search suggestions, the suggestions on Bing also were pushing conspiracy theories in their suggested searches.

Adding to these problems even more, Bing offers both horrible search suggestions and results, suggesting that a user (after searching for “girl”) instead searches for “cute young girl 16,” and it only gets worse from there. The image results are arguably even worse, delivering content that could get people in serious legal trouble. Searching for the wrong thing could result in, for example, bath time pictures of children displayed alongside hardcore adult materials.

Microsoft isn’t the first technology giant to contend with these kinds of issues, and you can be sure this won’t be the last time. With Network Solutions Unlimited’s help, you can also be sure that your business won’t join their ranks. Call 217-428-6449 to find out more about how we can help protect and optimize your business technology.

Tip of the Week: Extremely Useful Word Tips
Are You Prepared to Weather Any Disaster?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, March 19 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Settings Updates Language Keyboard Emergency Office 365 Microsoft Excel Gmail Smart Tech User Error End of Support Managed Service Provider Networking Personal Information Outlook Government Computer Accessories Charger Productivity Collaboration Word App store Bring Your Own Device Cortana Virtual Private Network Connectivity Microsoft Word IT solutions Miscellaneous Travel Upgrades Students Hyperlink Administration Productivity Sales Google Maps Quick Tips How To Data Management PowerPoint Windows 7 Virtual Assistant Money Proactive IT Paperless Office Wireless Charging Hardware Root Cause Analysis Virtual Reality IT Services Mobile Security Private Cloud Adobe App Black Market WannaCry Wireless Technology Cache Chromebook Chromecast Public Computer Windows 10 Disaster Recovery Projects Remote Workers Information Technology Windows Ink Screen Mirroring Comparison Proactive Video Games Unsupported Software Books Antivirus Passwords Content Filtering Worker IT Management Recovery Thank You Customer Redundancy How to intranet Keyboard Shortcuts Flexibility Education Devices Meetings Mobility Wi-Fi HIPAA Shadow IT Vendor Value Cost Management Phishing Hacking Legislation OneNote Loyalty Testing Websites Peripheral Router Office Tips Internet exploMicrosoft hacker Risk Management Smart Technology Shortcut Professional Services Vendor Management Sync Project Management Congratulations MSP Unified Threat Management IT Service SaaS Application Cloud Computing Access Control Technology Budget Employer Employee Relationship Printers Business Continuity Outsourced IT Data Loss Software Content Filter File Sharing Compliance Remote Monitoring Hackers Data Privacy Telephone Admin Smartphones Cloud Operating System Server Conferencing Mobile Malware Hard Drives Microsoft Office Facebook Innovation Battery Wireless Internet VPN Management Ransomware eWaste Medical IT Communication Employee-Employer Relationship Downtime Business Intelligence Excel Spyware Google Save Money Business Technology Health Monitors Television Telephone Systems Computing Infrastructure Human Resources Marketing File Storage Rootkit Alexa for Business Unified Communications Smartphone Laptop Edge Browser Storage Computing Payment Cards Webinar SMB Hard Disk Drive Reputation Break/Fix Mobile Device Management BDR Managed IT Services Managed IT Services Best Practices Firewall Financial Technology Employer-Employee Relationship Mobile Device Avoiding Downtime Computer Fan Managed IT Service Licensing Business Owner Payroll Tablets Phone System Business Management Monitoring Going Green Cybersecurity Privacy Device Security Hybrid Cloud Colocation Co-Managed Services Utility Computing Artificial Intelligence Google Assistant Workplace Tips Search Patch Management Best Practice Computers Virtualization Assessment Hard Drive Data Storage Cast HBO Advertising Touchpad Remote Computing USB WiFi Tip of the Week Big Data Windows 10 Memory Gadgets Communications Alert Solid State Drive Gifts Android Identities Ciminal Save Time Business Computing WPA3 Sports Humor Efficiency Bandwidth Users Display Nanotechnology Commerce IT Solutions Apple Gamification Password Company Culture Politics Update Data Theft Data Protection Content Wasting Time Dark Web Hiring/Firing Experience Business iOS Scam Encryption Internet Techology Transportation Upgrade Backup Managed IT Electronic Medical Records Consultant Camera Managing Stress Software as a Service Automobile Evernote Blockchain Identity The Internet of Things Retail Saving Money Information Automation Small Business Printing Analytics Two-factor Authentication Robot Emails BYOD Workers Law Enforcement Public Cloud Training Lifestyle Files Data Recovery Applications Network Augmented Reality Windows Apps Wasting Money Saving Time Security Cameras Spam Security Chrome Samsung Touchscreen Data Backup Social Media Google Docs Benefits Regulation Google Drive Work/Life Balance Social Engineering Tech Term Cybercrime History Safety Credit Cards Analysis CrashOverride Legal Email E-Commerce Holiday Office Managed Service Amazon IoT Wireless Two Factor Authentication Hosted Solutions Fraud Computer Audiobook Physical Security Employee VoIP Twitter Entertainment Virus IT Support Bluetooth HaaS Troubleshooting Data Security Backup and Disaster Recovery iPhone User Tips Data Breach PDF IT budget Streaming Media Vulnerability Spam Blocking Windows 10s Network Security IT Support Internet Exlporer Financial Internet of Things Tech Support Data Data storage Relocation Document Management Identity Theft Audit Specifications Hosted Solution NFL Accessory Monitor FAQ Scalability Computer Forensics Instant Messaging Computer Care Mobile Devices Machine Learning Microsoft Cleaning Worker Commute Maintenance WIndows Server 2008