croom new

Patriot Tech Services Inc. Blog

Bing Offers Malware and Filth

Bing Offers Malware and Filth

With a meager market share that is one-third the size of Google’s, one would think that Bing would be trying to keep controversy away from a user’s search results. However, the Microsoft search engine has recently encountered a few notable PR disasters that may be enough to convince some not to use it - especially if it leads to a security breach.

What is Going On
Considering the difference in the market shares of Microsoft Edge and Google Chrome (4.24 percent compared to 67.66 percent, respectively), it should come as no surprise that the first thing that many owners of a Windows 10 device do is to use Edge to download Chrome. Naturally, Edge defaults to Bing to conduct these searches. However, these searches have taken to delivering disguised malware sites as sponsored ads for Google Chrome within these search results.

When the user searches Bing to find the download link for Chrome, there is the chance that, instead of a sponsored result popping up from Google, one will pop up that only appears to be from Google at first glance. However, once clicked on, this link brings a user to a phishing site disguised to look like the Google Chrome download page, with the URL ‘’ Trying to access this site through Chrome itself results in the user finding it to be blocked, while Bing and Edge do no such thing.

Not a New Problem
Making this situation even worse, this is not the first time that Bing has had this issue. Back in April of this year, this threat was reported as effectively identical to this recent version - and while the advertisement has been pulled, there has been no explanation of how it could appear to come from, or if this issue had been resolved.

This means that it is entirely likely that this issue will pop up once again.

Other Bing Issues
Of course, this isn’t the only problematic element of the Bing search engine. Its search function has a history of delivering highly offensive and alarming content, especially through its image search. Searches for what are objectively neutral terms would deliver back inflammatory results, even with SafeSearch on. Similar things happen when you search for other terms as well. In addition to racist search suggestions, the suggestions on Bing also were pushing conspiracy theories in their suggested searches.

Adding to these problems even more, Bing offers both horrible search suggestions and results, suggesting that a user (after searching for “girl”) instead searches for “cute young girl 16,” and it only gets worse from there. The image results are arguably even worse, delivering content that could get people in serious legal trouble. Searching for the wrong thing could result in, for example, bath time pictures of children displayed alongside hardcore adult materials.

Microsoft isn’t the first technology giant to contend with these kinds of issues, and you can be sure this won’t be the last time. With Patriot Tech Services Inc.’s help, you can also be sure that your business won’t join their ranks. Call 877-874-4629 to find out more about how we can help protect and optimize your business technology.

Tip of the Week: Extremely Useful Word Tips
Are You Prepared to Weather Any Disaster?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, March 23 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Google Cloud Network Security User Tips Hackers Tech Term Microsoft Business Computing Computer Innovation Productivity Software Business Management Mobile Devices Hardware Malware Browser Hosted Solutions Efficiency Smartphone Email Windows 10 Windows 10 Data Backup Data Smartphones Internet of Things Apps Workplace Tips Upgrade Communication Windows Miscellaneous Business IT Services Data Security Cybersecurity Productivity Passwords Data Recovery Outsourced IT communications Small Business Office 365 Mobile Device Management Best Practice VoIP Backup Android Business Continuity Cybercrime Spam Holiday Server IT Support Operating System Network Two-factor Authentication Saving Money Virtualization Networking Users Social Media Employer-Employee Relationship Managed Service Provider Gmail Information Automation Applications User Error Facebook Data Management Health Update Budget Blockchain Office Phishing Remote Computing Cost Management Bandwidth Tech Support Government Chrome Collaboration Vulnerability Law Enforcement Alert Microsoft Office Ransomware Google Drive Artificial Intelligence Bring Your Own Device Money Disaster Recovery Gadgets Travel Quick Tips Mobile Device Proactive IT eWaste Business Technology Going Green Hybrid Cloud Politics Mobile Security Managed IT Services Meetings Google Assistant Information Technology Router Fraud Computers Apple Save Money Wi-Fi Wireless Technology Human Resources Password Wireless Charging Streaming Media Saving Time Telephone Systems VPN OneNote Google Docs Safety The Internet of Things Conferencing Access Control Social Engineering Word iPhone Cortana Social Data Breach App Managed Service DDoS Managed IT Services Recovery Search Marketing Application Evernote Sports Retail Cloud Computing Hacking Encryption Office Tips Project Management Risk Management Devices Workers Teamwork Management Payment Cards Audit Storage Virus Trending Windows 7 History FAQ Bluetooth Printing Telephony Payroll IT budget Firewall Touchscreen BDR Spyware Transportation Augmented Reality Specifications Accessory Updates Wireless Internet Files Employee Tablets WiFi Proactive Display Private Cloud Customer Service Charger Fax Server Uninterrupted Power Supply Security Cameras Television Testing Laptop Remote Monitoring Data Protection Vendor Management Amazon Robot Data Loss Humor Sales Benefits Identity Peripheral Microsoft Word Gamification Break/Fix WannaCry NFL File Sharing Websites Co-Managed Services Value Machine Learning Shortcut Identities Software as a Service Camera Touchpad Mobility IT Management Antivirus Edge Virtual Assistant PDF IT Support Branding Data Privacy SaaS Legal Scam Bloatware Maintenance Memory Chromecast Medical IT Entertainment Excel Data Theft Telephone Disaster Downtime Mobile Computing Language Projects Operating Sysytem Managed IT Hacker Customer Relationship Management Ciminal Alexa for Business Vendor Data storage Microsoft Excel Emergency Gifts Hard Drive Internet Exlporer Admin Lithium-ion battery Device Security Wearable Technology Financial Administrator Windows Ink Legislation Computing Hosted Solution Hyperlink Computer Forensics E-Commerce Reputation Identity Theft Biometrics Avoiding Downtime Commerce Personal Information Chromebook Keyboard Shortcuts Patch Management PowerPoint Distributed Denial of Service Employee-Employer Relationship Credit Cards Running Cable Access Google Maps Comparison IT solutions App store Wasting Time Wireless Hiring/Firing Virtual Reality Worker Commute Near Field Communication Solid State Drive Outlook Instant Messaging Thank You Presentation Compliance Cache Worker Analytics HBO How To End of Support Books Smart Technology Computer Fan Work/Life Balance Data Storage Hard Disk Drive Sync USB Congratulations Network Congestion Regulation Unified Threat Management Emails Current Events Big Data CrashOverride Advertising Electronic Medical Records Science Automobile Screen Mirroring Video Games Tablet WIndows 7 Relocation User Battery Business Intelligence Computer Care Save Time Administration IT consulting Webinar Samsung Cast Cameras Managing Stress Monitors Regulations Twitter Adobe Point of Sale Unsupported Software HaaS IT solutions WIndows Server 2008 Black Market Training Computer Accessories Text Messaging Upgrades BYOD Flexibility Employer Employee Relationship Printer Nanotechnology Experience Keyboard Best Available SharePoint iOS Licensing Education Printers Windows 10s Company Culture Mouse Settings Cleaning Hard Drives Consultant Scalability Printer Server Phone System Root Cause Analysis Music intranet

Sign Up For Our Newsletter

  • First Name *
  • Last Name *

      Latest Blog Entry

      Virtual assistants have a lot of promise as a productivity tool, so it only makes sense that they would begin to appear in the workplace. Unfortunately, these devices have also gained a reputation as a security risk. Whether or not you’ve considered bringing virtual assistan...

      Latest News

      Patriot Tech Services Inc. launches new website!

      Patriot Tech Services Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login