croom new

Patriot Tech Services Inc. Blog

Bing Offers Malware and Filth

Bing Offers Malware and Filth

With a meager market share that is one-third the size of Google’s, one would think that Bing would be trying to keep controversy away from a user’s search results. However, the Microsoft search engine has recently encountered a few notable PR disasters that may be enough to convince some not to use it - especially if it leads to a security breach.

What is Going On
Considering the difference in the market shares of Microsoft Edge and Google Chrome (4.24 percent compared to 67.66 percent, respectively), it should come as no surprise that the first thing that many owners of a Windows 10 device do is to use Edge to download Chrome. Naturally, Edge defaults to Bing to conduct these searches. However, these searches have taken to delivering disguised malware sites as sponsored ads for Google Chrome within these search results.

When the user searches Bing to find the download link for Chrome, there is the chance that, instead of a sponsored result popping up from Google, one will pop up that only appears to be from Google at first glance. However, once clicked on, this link brings a user to a phishing site disguised to look like the Google Chrome download page, with the URL ‘’ Trying to access this site through Chrome itself results in the user finding it to be blocked, while Bing and Edge do no such thing.

Not a New Problem
Making this situation even worse, this is not the first time that Bing has had this issue. Back in April of this year, this threat was reported as effectively identical to this recent version - and while the advertisement has been pulled, there has been no explanation of how it could appear to come from, or if this issue had been resolved.

This means that it is entirely likely that this issue will pop up once again.

Other Bing Issues
Of course, this isn’t the only problematic element of the Bing search engine. Its search function has a history of delivering highly offensive and alarming content, especially through its image search. Searches for what are objectively neutral terms would deliver back inflammatory results, even with SafeSearch on. Similar things happen when you search for other terms as well. In addition to racist search suggestions, the suggestions on Bing also were pushing conspiracy theories in their suggested searches.

Adding to these problems even more, Bing offers both horrible search suggestions and results, suggesting that a user (after searching for “girl”) instead searches for “cute young girl 16,” and it only gets worse from there. The image results are arguably even worse, delivering content that could get people in serious legal trouble. Searching for the wrong thing could result in, for example, bath time pictures of children displayed alongside hardcore adult materials.

Microsoft isn’t the first technology giant to contend with these kinds of issues, and you can be sure this won’t be the last time. With Patriot Tech Services Inc.’s help, you can also be sure that your business won’t join their ranks. Call 877-874-4629 to find out more about how we can help protect and optimize your business technology.

Tip of the Week: Extremely Useful Word Tips
Are You Prepared to Weather Any Disaster?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, November 13 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Google Cloud Network Security Tech Term Computer Hackers Microsoft User Tips Malware Software Business Management Hardware Efficiency Innovation Business Computing Windows 10 Mobile Devices Browser Apps Productivity Email Windows Internet of Things Business Data Hosted Solutions Productivity Cybersecurity Smartphones Data Backup Mobile Device Management Miscellaneous Best Practice Upgrade Backup Workplace Tips Smartphone Passwords Cybercrime Windows 10 communications VoIP Data Security Business Continuity Operating System Two-factor Authentication Outsourced IT Spam Holiday Small Business IT Support Server Employer-Employee Relationship Managed Service Provider Office 365 Gmail Android IT Services Data Recovery Network Google Drive Data Management Networking Disaster Recovery Budget Communication Money Virtualization Office Saving Money Phishing Remote Computing User Error Information Bandwidth Update Vulnerability Alert Cost Management Chrome Tech Support Ransomware Microsoft Office Government Blockchain Collaboration Automation Law Enforcement Risk Management Hacking Politics Cortana Gadgets Data Breach Artificial Intelligence Health Managed Service Encryption Going Green eWaste Applications Quick Tips Facebook Information Technology Wireless Technology Project Management The Internet of Things Social Media Devices Bring Your Own Device Managed IT Services Google Docs Computers Router Users Social Engineering Word Apple Password Streaming Media Mobile Security Wi-Fi Recovery Telephone Systems VPN Application Google Assistant Safety Retail Social Marketing Fraud Office Tips App iPhone DDoS Wireless Charging Travel Mobile Device Sports Proactive IT Touchscreen Maintenance Memory Augmented Reality Distributed Denial of Service Data Theft Reputation Identity Theft Co-Managed Services Tablets Running Cable Access Firewall Language Camera WiFi Access Control Customer Service Teamwork Ciminal Alexa for Business Remote Monitoring Trending History Gifts Hard Drive Data Protection Bluetooth Telephony Device Security Financial Data Loss Legislation Computing Telephone Evernote Computer Forensics WannaCry NFL Transportation Projects Human Resources Admin Meetings Files Humor BDR Vendor Shortcut Private Cloud Credit Cards Chromebook Hyperlink Fax Server Uninterrupted Power Supply Saving Time OneNote Television Laptop Comparison App store Benefits Workers Management Bloatware Robot Virus Excel SaaS Antivirus Printing Save Money IT budget IT Support Vendor Management Employee-Employer Relationship Managed IT FAQ Wasting Time Spyware Hybrid Cloud Customer Relationship Management Managed IT Services Microsoft Excel Touchpad Specifications Branding Updates Mobile Computing Wireless Internet Lithium-ion battery Windows Ink Proactive Windows 7 Charger PDF Chromecast Business Technology Cloud Computing Commerce Accessory Patch Management Disaster Amazon Legal Scam Operating Sysytem Sales Identity Internet Exlporer Microsoft Word Biometrics Gamification Google Maps Data storage File Sharing Websites Display IT solutions PowerPoint Value Emergency Audit Wearable Technology Administrator Identities Software as a Service Testing Storage Hosted Solution Peripheral Edge Virtual Assistant Avoiding Downtime Conferencing Data Privacy Search HBO Near Field Communication Personal Information Keyboard Thank You Presentation Twitter Cleaning Computer Fan Company Culture Data Storage Music Hard Disk Drive Sync Scalability Network Congestion Science Emails Wireless Hiring/Firing CrashOverride Worker Commute Congratulations Worker Unified Threat Management Instant Messaging Automobile Screen Mirroring End of Support Books User How To Computer Care Big Data Webinar IT Management Smart Technology Tablet WIndows 7 Work/Life Balance Business Intelligence Monitors Administration IT consulting USB Printers Cast Advertising Electronic Medical Records Adobe Compliance Current Events Unsupported Software IT solutions WIndows Server 2008 Video Games Computer Accessories Cameras Managing Stress Relocation Mobility Save Time Nanotechnology Regulations Battery Upgrades BYOD Best Available iOS Licensing Regulation Samsung Education Hard Drives Windows 10s Mouse Settings Printer Entertainment HaaS Hacker Root Cause Analysis Point of Sale intranet Consultant Text Messaging Virtual Reality Black Market Training Analytics Solid State Drive Outlook SharePoint Flexibility Employer Employee Relationship Cache Printer Server Phone System Experience

Sign Up For Our Newsletter

  • First Name *
  • Last Name *

      Latest Blog Entry

      It’s no secret that business operations have a lot of moving parts that need to be considered. The thing is, these parts are most likely the simplest elements of any workflow, but take up large portions of time simply due to the number of them that need to be addressed....

      Latest News

      Patriot Tech Services Inc. launches new website!

      Patriot Tech Services Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login