Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Bing Offers Malware and Filth

Bing Offers Malware and Filth

With a meager market share that is one-third the size of Google’s, one would think that Bing would be trying to keep controversy away from a user’s search results. However, the Microsoft search engine has recently encountered a few notable PR disasters that may be enough to convince some not to use it - especially if it leads to a security breach.

What is Going On
Considering the difference in the market shares of Microsoft Edge and Google Chrome (4.24 percent compared to 67.66 percent, respectively), it should come as no surprise that the first thing that many owners of a Windows 10 device do is to use Edge to download Chrome. Naturally, Edge defaults to Bing to conduct these searches. However, these searches have taken to delivering disguised malware sites as sponsored ads for Google Chrome within these search results.

When the user searches Bing to find the download link for Chrome, there is the chance that, instead of a sponsored result popping up from Google, one will pop up that only appears to be from Google at first glance. However, once clicked on, this link brings a user to a phishing site disguised to look like the Google Chrome download page, with the URL ‘googleonline2018.com.’ Trying to access this site through Chrome itself results in the user finding it to be blocked, while Bing and Edge do no such thing.

Not a New Problem
Making this situation even worse, this is not the first time that Bing has had this issue. Back in April of this year, this threat was reported as effectively identical to this recent version - and while the advertisement has been pulled, there has been no explanation of how it could appear to come from google.com, or if this issue had been resolved.

This means that it is entirely likely that this issue will pop up once again.

Other Bing Issues
Of course, this isn’t the only problematic element of the Bing search engine. Its search function has a history of delivering highly offensive and alarming content, especially through its image search. Searches for what are objectively neutral terms would deliver back inflammatory results, even with SafeSearch on. Similar things happen when you search for other terms as well. In addition to racist search suggestions, the suggestions on Bing also were pushing conspiracy theories in their suggested searches.

Adding to these problems even more, Bing offers both horrible search suggestions and results, suggesting that a user (after searching for “girl”) instead searches for “cute young girl 16,” and it only gets worse from there. The image results are arguably even worse, delivering content that could get people in serious legal trouble. Searching for the wrong thing could result in, for example, bath time pictures of children displayed alongside hardcore adult materials.

Microsoft isn’t the first technology giant to contend with these kinds of issues, and you can be sure this won’t be the last time. With Network Solutions Unlimited’s help, you can also be sure that your business won’t join their ranks. Call 217-428-6449 to find out more about how we can help protect and optimize your business technology.

Tip of the Week: Extremely Useful Word Tips
Are You Prepared to Weather Any Disaster?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, January 22 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Office Data Management Mobility Hiring/Firing Alert Entertainment Bandwidth Gmail Twitter IT Services Sales Gamification Augmented Reality Business Computing Password Troubleshooting Bluetooth Reputation Business Technology Personal Information App store Lifestyle Best Practice Compliance MSP Cache Audit Management Redundancy Office 365 Hard Disk Drive Printers Co-Managed Services Vendor Management Saving Money Printing Two Factor Authentication SMB Two-factor Authentication Keyboard Shortcuts Miscellaneous Wireless Charging Data Theft Access Control Worker Commute USB Computer Forensics Adobe Small Business Wireless Users Analysis Communications File Sharing Risk Management Private Cloud Microsoft Office Devices Battery Robot iPhone Internet Peripheral Evernote Managing Stress Relocation Smart Tech Storage Screen Mirroring Wasting Money Data Privacy PowerPoint IT Service Keyboard Browser Privacy Save Time Computer Fan Identity Patch Management Audiobook Touchscreen Books Benefits Managed IT Services Training Search Shortcut Cybersecurity Spam Websites Loyalty Public Cloud Google Docs Public Computer Google Maps Automobile Employer Employee Relationship Smartphones Computer Accessories Proactive IT BYOD Update Antivirus Legal Paperless Office Credit Cards Applications Windows 7 Rootkit Testing Assessment Unified Threat Management Work/Life Balance Language Hyperlink HaaS intranet Wireless Internet Recovery Device Security Mobile Devices iOS Sports Wasting Time Thank You Video Games Cloud Computing Application How to Travel Downtime Tech Term Identities Updates Google Camera Content Filtering Chromecast Mobile Security Administration Amazon Firewall Scam Phishing Telephone Systems Emails Machine Learning NFL Safety Business Owner Unified Communications Computer Google Drive IT Solutions Monitoring Touchpad Apple Router Hard Drives The Internet of Things Monitor Security Technology Computers Chrome Hosted Solution Social Media Spyware Remote Computing File Storage Tech Support Computing Infrastructure BDR Data Experience Law Enforcement Software as a Service Vendor Windows 10s Server Cybercrime Data Loss Company Culture Tablets Hackers Budget Value Monitors Computing Cloud Holiday Avoiding Downtime Data Breach Money Electronic Medical Records Licensing Word Spam Blocking Social Engineering Display Going Green User Error Television Blockchain Productivity Conferencing Financial Technology Humor Networking Chromebook Financial Network Operating System Gadgets Upgrade VPN Advertising SaaS Business Continuity Workplace Tips Cortana Specifications Smartphone Worker Charger IoT Content Filter Information Technology Data storage Edge Security Cameras Alexa for Business Managed IT Wi-Fi Managed Service Provider Computer Care Dark Web Bring Your Own Device Maintenance Business Government Techology Cast Black Market Hard Drive Smart Technology Data Protection Politics Saving Time Microsoft Excel Files Samsung Android Virtual Assistant CrashOverride Network Security Accessory Apps How To Marketing Memory Settings Physical Security HIPAA App Ciminal Remote Monitoring Malware WannaCry Disaster Recovery Email Human Resources Internet exploMicrosoft Data Storage Document Management Virtual Private Network Mobile Device Wireless Technology Webinar Phone System Sync Vulnerability Scalability Mobile Device Management Excel PDF Hardware Collaboration HBO Managed IT Service Legislation Content Upgrades Employee-Employer Relationship Encryption Passwords Data Recovery Cost Management Retail Education Cleaning Virtual Reality Remote Workers WIndows Server 2008 Shadow IT Best Practices Payroll Streaming Media Virtualization Data Security Hybrid Cloud Save Money FAQ Windows 10 Flexibility IT Support Root Cause Analysis IT budget Identity Theft Emergency Employer-Employee Relationship Laptop Business Management Tip of the Week Transportation Software Unsupported Software Hosted Solutions hacker Quick Tips Utility Computing Innovation End of Support Google Assistant VoIP Admin Solid State Drive IT Management Telephone Colocation Instant Messaging Professional Services Mobile Projects History Project Management Consultant Connectivity Big Data Congratulations WPA3 Artificial Intelligence Students IT solutions Virus Windows Ink Workers Outsourced IT Proactive Business Intelligence Commerce Ransomware Backup Internet of Things Microsoft Word Gifts User Tips Data Backup Hacking Outlook Regulation Customer eWaste Facebook Managed IT Services Meetings Efficiency Comparison Microsoft Windows 10 Windows Office Tips Health Automation Managed Service Internet Exlporer OneNote Communication Nanotechnology Fraud Information IT Support Productivity WiFi