croom new

Patriot Tech Services Inc. Blog

Bing Offers Malware and Filth

Bing Offers Malware and Filth

With a meager market share that is one-third the size of Google’s, one would think that Bing would be trying to keep controversy away from a user’s search results. However, the Microsoft search engine has recently encountered a few notable PR disasters that may be enough to convince some not to use it - especially if it leads to a security breach.

What is Going On
Considering the difference in the market shares of Microsoft Edge and Google Chrome (4.24 percent compared to 67.66 percent, respectively), it should come as no surprise that the first thing that many owners of a Windows 10 device do is to use Edge to download Chrome. Naturally, Edge defaults to Bing to conduct these searches. However, these searches have taken to delivering disguised malware sites as sponsored ads for Google Chrome within these search results.

When the user searches Bing to find the download link for Chrome, there is the chance that, instead of a sponsored result popping up from Google, one will pop up that only appears to be from Google at first glance. However, once clicked on, this link brings a user to a phishing site disguised to look like the Google Chrome download page, with the URL ‘’ Trying to access this site through Chrome itself results in the user finding it to be blocked, while Bing and Edge do no such thing.

Not a New Problem
Making this situation even worse, this is not the first time that Bing has had this issue. Back in April of this year, this threat was reported as effectively identical to this recent version - and while the advertisement has been pulled, there has been no explanation of how it could appear to come from, or if this issue had been resolved.

This means that it is entirely likely that this issue will pop up once again.

Other Bing Issues
Of course, this isn’t the only problematic element of the Bing search engine. Its search function has a history of delivering highly offensive and alarming content, especially through its image search. Searches for what are objectively neutral terms would deliver back inflammatory results, even with SafeSearch on. Similar things happen when you search for other terms as well. In addition to racist search suggestions, the suggestions on Bing also were pushing conspiracy theories in their suggested searches.

Adding to these problems even more, Bing offers both horrible search suggestions and results, suggesting that a user (after searching for “girl”) instead searches for “cute young girl 16,” and it only gets worse from there. The image results are arguably even worse, delivering content that could get people in serious legal trouble. Searching for the wrong thing could result in, for example, bath time pictures of children displayed alongside hardcore adult materials.

Microsoft isn’t the first technology giant to contend with these kinds of issues, and you can be sure this won’t be the last time. With Patriot Tech Services Inc.’s help, you can also be sure that your business won’t join their ranks. Call 877-874-4629 to find out more about how we can help protect and optimize your business technology.

Tip of the Week: Extremely Useful Word Tips
Are You Prepared to Weather Any Disaster?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, January 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Cloud Google Network Security User Tips Hackers Tech Term Computer Business Computing Microsoft Mobile Devices Malware Hardware Business Management Efficiency Software Innovation Data Windows 10 Data Backup Browser Smartphone Hosted Solutions Workplace Tips Apps Productivity Email Internet of Things Data Security Business Smartphones Windows 10 Upgrade Windows Backup Data Recovery VoIP IT Services Business Continuity Mobile Device Management Productivity Miscellaneous Cybersecurity Passwords Best Practice Android communications Outsourced IT Operating System Spam Holiday IT Support Cybercrime Small Business Office 365 Managed Service Provider Gmail Employer-Employee Relationship Saving Money Server Network Two-factor Authentication Networking Cost Management Budget Law Enforcement Tech Support Microsoft Office Office Government Phishing Remote Computing Collaboration Bandwidth Artificial Intelligence Blockchain Money Alert Google Drive Disaster Recovery Ransomware Communication Virtualization Applications Users User Error Automation Vulnerability Update Chrome Data Management Information iPhone Devices Bring Your Own Device Streaming Media Telephone Systems VPN Social Marketing Wireless Technology Human Resources Mobile Device Travel Access Control App Mobile Security The Internet of Things DDoS Saving Time Politics Google Assistant Social Engineering Encryption Sports Fraud Quick Tips Risk Management Hacking Gadgets Wireless Charging Application Going Green Recovery Retail OneNote Google Docs Managed IT Services eWaste Cortana Information Technology Office Tips Facebook Data Breach Router Managed Service Word Business Technology Social Media Managed IT Services Wi-Fi Proactive IT Computers Evernote Password Safety Apple Project Management Health Customer Service Patch Management Peripheral Legal Scam Comparison Touchpad Mobile Computing App store Branding Workers Management Co-Managed Services Hacker Virus Google Maps FAQ Printing Camera Emergency Chromecast IT budget Audit Machine Learning Search Disaster Spyware Hybrid Cloud Specifications Operating Sysytem Biometrics Shortcut Reputation Identity Theft Internet Exlporer Updates Wireless Internet Touchscreen Telephone Personal Information Data storage PowerPoint Proactive Augmented Reality Hosted Solution Charger Excel Projects Wearable Technology Administrator Bloatware Tablets Remote Monitoring Vendor Amazon Admin Sales Avoiding Downtime Identity Data Loss Firewall Microsoft Word Gamification Data Protection Hyperlink Distributed Denial of Service File Sharing Websites Customer Relationship Management Value Running Cable Access Identities Lithium-ion battery Software as a Service WannaCry NFL Employee-Employer Relationship Teamwork Edge Virtual Assistant Keyboard Shortcuts BDR Trending Conferencing History Data Privacy Bluetooth Telephony Maintenance Memory Wasting Time Data Theft Humor IT solutions SaaS Windows 7 Transportation Language Gifts Private Cloud Hard Drive Storage Managed IT Meetings Files Ciminal Alexa for Business Payroll Vendor Management Microsoft Excel Fax Server Uninterrupted Power Supply Device Security Financial Accessory Television Legislation Laptop Computing Benefits IT Support Computer Forensics Display Mobility Robot Antivirus Windows Ink Credit Cards Chromebook WiFi Cloud Computing Commerce Testing PDF Save Money Security Cameras Settings Entertainment Regulations Windows 10s Network Congestion Point of Sale Science Consultant HaaS Root Cause Analysis Text Messaging Printer Compliance Black Market Training Cache Experience User Solid State Drive Outlook Flexibility Employer Employee Relationship HBO Keyboard Data Storage Cleaning Printer Server Phone System Regulation Computer Fan Downtime Company Culture Music SharePoint Hard Disk Drive Sync Scalability Near Field Communication Worker Commute Emails Wireless Hiring/Firing Thank You Presentation Computer Accessories CrashOverride Automobile Screen Mirroring Printers Worker Instant Messaging Education Computer Care End of Support Books Best Available How To Work/Life Balance Unified Threat Management Hard Drives Webinar IT Management Smart Technology Congratulations Mouse USB Twitter intranet Cast Big Data Monitors Unsupported Software Advertising Electronic Medical Records Tablet WIndows 7 Virtual Reality Adobe Current Events Relocation Administration IT consulting Analytics IT solutions WIndows Server 2008 Video Games Business Intelligence Battery Upgrades BYOD Save Time Nanotechnology Cameras Managing Stress iOS Licensing Samsung

Sign Up For Our Newsletter

  • First Name *
  • Last Name *

      Latest Blog Entry

      It is remarkable how much trust people have in Internet-based companies. Not just that they will fulfill the expectations placed on them, but that people routinely provide extremely sensitive information to these companies without thinking for a second about what they do wit...

      Latest News

      Patriot Tech Services Inc. launches new website!

      Patriot Tech Services Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login