Contact us today!

Network Solutions Unlimited Blog

Bing Offers Malware and Filth

Bing Offers Malware and Filth

With a meager market share that is one-third the size of Google’s, one would think that Bing would be trying to keep controversy away from a user’s search results. However, the Microsoft search engine has recently encountered a few notable PR disasters that may be enough to convince some not to use it - especially if it leads to a security breach.

What is Going On
Considering the difference in the market shares of Microsoft Edge and Google Chrome (4.24 percent compared to 67.66 percent, respectively), it should come as no surprise that the first thing that many owners of a Windows 10 device do is to use Edge to download Chrome. Naturally, Edge defaults to Bing to conduct these searches. However, these searches have taken to delivering disguised malware sites as sponsored ads for Google Chrome within these search results.

When the user searches Bing to find the download link for Chrome, there is the chance that, instead of a sponsored result popping up from Google, one will pop up that only appears to be from Google at first glance. However, once clicked on, this link brings a user to a phishing site disguised to look like the Google Chrome download page, with the URL ‘’ Trying to access this site through Chrome itself results in the user finding it to be blocked, while Bing and Edge do no such thing.

Not a New Problem
Making this situation even worse, this is not the first time that Bing has had this issue. Back in April of this year, this threat was reported as effectively identical to this recent version - and while the advertisement has been pulled, there has been no explanation of how it could appear to come from, or if this issue had been resolved.

This means that it is entirely likely that this issue will pop up once again.

Other Bing Issues
Of course, this isn’t the only problematic element of the Bing search engine. Its search function has a history of delivering highly offensive and alarming content, especially through its image search. Searches for what are objectively neutral terms would deliver back inflammatory results, even with SafeSearch on. Similar things happen when you search for other terms as well. In addition to racist search suggestions, the suggestions on Bing also were pushing conspiracy theories in their suggested searches.

Adding to these problems even more, Bing offers both horrible search suggestions and results, suggesting that a user (after searching for “girl”) instead searches for “cute young girl 16,” and it only gets worse from there. The image results are arguably even worse, delivering content that could get people in serious legal trouble. Searching for the wrong thing could result in, for example, bath time pictures of children displayed alongside hardcore adult materials.

Microsoft isn’t the first technology giant to contend with these kinds of issues, and you can be sure this won’t be the last time. With Network Solutions Unlimited’s help, you can also be sure that your business won’t join their ranks. Call 217-428-6449 to find out more about how we can help protect and optimize your business technology.

Tip of the Week: Extremely Useful Word Tips
Are You Prepared to Weather Any Disaster?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, November 18 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Telephone Systems Screen Mirroring Hosted Solution Computing Advertising Emails Cache HBO Quick Tips Display Tip of the Week Content Filter HaaS Credit Cards Techology File Sharing Encryption Video Games Chrome Business Management Best Practice Recovery Webinar Computer Care Data Theft Going Green Computing Infrastructure Two-factor Authentication Training Worker Data Backup Facebook Wi-Fi Bluetooth Automobile Android Computer Accessories Printing Office 365 Data Privacy File Storage Cloud Computing Audit Cloud Excel Flexibility OneNote Books Best Practices Business Intelligence Chromecast Outsourced IT Apple Artificial Intelligence Small Business Apps Compliance Firewall Robot Shadow IT Benefits Employer Employee Relationship Computers Colocation Emergency Wasting Time Saving Time Sports Proactive MSP The Internet of Things Browser Upgrade Humor Unified Communications PDF iPhone Application Virtual Assistant Fraud Loyalty Settings Backup Innovation Managed IT Document Management Comparison Shortcut Disaster Recovery Meetings Windows 10s Microsoft Office Hosted Solutions User Tips Cast Legal Marketing Admin Mobile Device Identity Data Management Bring Your Own Device Privacy Smartphones Saving Money Efficiency Camera Utility Computing Co-Managed Services Business Technology VoIP iOS Education Peripheral Wasting Money WiFi Social Media Solid State Drive Security Scam Google Assistant End of Support Email Websites Tech Term Blockchain Business Owner App Phishing Device Security Social Engineering Projects How To Administration Passwords Project Management Professional Services Cleaning Data storage Company Culture Spam Blocking Malware Remote Computing Storage Testing Gifts Internet Exlporer Cost Management Hackers Gadgets IT Support eWaste WannaCry Upgrades Big Data WIndows Server 2008 Software as a Service Google Docs Communication Employee-Employer Relationship Management Data Protection Monitoring Updates Augmented Reality FAQ Scalability Data Recovery Content Filtering Relocation Law Enforcement Remote Monitoring Internet of Things Wireless Charging Smart Tech Tech Support Private Cloud Vendor Transportation Mobile Security Keyboard Shortcuts Health Hybrid Cloud Microsoft Excel Vulnerability Television Workplace Tips USB Virus Thank You Keyboard Data Security Business Computing Avoiding Downtime Automation Printers Bandwidth Cybercrime Black Market Save Money Charger Wireless Technology Data Breach Wireless Ciminal Adobe Files IoT Users Google Maps PowerPoint Managed Service Save Time Legislation Virtualization Government HIPAA Workers Information Technology Mobility Business Continuity Hard Disk Drive Customer Tablets Public Computer Consultant CrashOverride Network Security Router Risk Management Operating System Money Spam Entertainment Electronic Medical Records Accessory Retail Sales Regulation Content Proactive IT Data Windows 10 Windows Ink Google Assessment Search Office Office Tips Data Storage Software Phone System IT Management Value Productivity Redundancy Troubleshooting Data Loss IT budget Server Mobile Device Management Lifestyle Internet exploMicrosoft Word Applications Hacking Managing Stress Congratulations Cybersecurity Business WPA3 Sync Hardware Managed IT Services Holiday Employer-Employee Relationship Managed IT Services Productivity Physical Security Smartphone Financial Technology Smart Technology Antivirus Ransomware Wireless Internet Chromebook History Mobile Worker Commute Instant Messaging Twitter Personal Information Audiobook Amazon IT Solutions Password Politics Hyperlink IT solutions Language Technology Devices Virtual Reality Laptop Specifications IT Support Computer Forensics Budget Update Unsupported Software Managed Service Provider Patch Management Public Cloud Networking Battery Microsoft Dark Web Hard Drive Access Control intranet Maintenance Safety Touchpad Gamification User Error Evernote Work/Life Balance Hiring/Firing How to BYOD App store Collaboration Computer Fan Telephone Information Windows 10 Samsung VPN Network IT Services Windows 7 Memory Internet Licensing Hard Drives Gmail Google Drive Rootkit Analysis Reputation Windows Vendor Management Two Factor Authentication NFL Monitors Travel Microsoft Word Conferencing BDR Touchscreen Alexa for Business hacker Connectivity Alert Mobile Devices Streaming Media Miscellaneous Root Cause Analysis Spyware SaaS Communications Experience Cortana Edge Commerce Monitor Computer Nanotechnology Managed IT Service Identities Financial Identity Theft Students Downtime Outlook Unified Threat Management