Vulnerabilities / Threats
06:32 PM
Connect Directly

Microsoft Bing Ads Warn About Scams

As part of its ongoing security push, Microsoft is teaming up with the government and Western Union to run search ads to educate users about potential online fraud.

In keeping with expanding efforts to educate consumers about security risks, Microsoft, in conjunction with the Federal Trade Commission, the United States Postal Inspection Service and Western Union, has launched a series of online public service announcements (PSAs) on its Bing search engine to warn searchers about online scams.

The PSAs appear as sponsored ads atop Bing search results lists in response to keywords commonly targeted by scammers.

A search for "Microsoft Lottery," for example, returns a sponsored link at the top of the search results list titled "Advance Fee Fraud Scams," followed by the admonition, "Don't send money before verifying the source of the request."

The link leads to a Microsoft Web page that explains how advance fee fraud scams work.

Other keywords designed to trigger the PSAs -- such as "credit repair" and "mortgage foreclosure" -- lead to landing pages hosted by the FTC. However, these PSA links are intermingled with other sponsored links on, making them less noticeable than the lone Microsoft ad triggered by the keywords "Microsoft Lottery."

"The campaign builds on similar information we recently began providing in Windows Live, all with the idea that by providing education within the product experience, consumers will be reminded to be cautious at the very moment it's most important," said Microsoft associate general counsel Tim Cranton, in a blog post. "Obviously, these particular issues are not the only scams or fraud consumers might come across online, but they certainly are some of the more prevalent scams out there. We see this campaign as a positive step in an ongoing effort to help make the Internet a safer place."

Microsoft has taken other steps in the same direction recently. Two weeks ago, Cranton announced a related effort to improve online security: the filing of five lawsuits aimed at curbing the spread of malicious online ads, or malvertising. And on Tuesday, Microsoft also released its own free antivirus software, Microsoft Security Essentials, in an effort to raise the security baseline of Windows systems.

Rohyt Belani, managing partner and co-founder of the Intrepidus Group, a security consultancy, said in a phone interview that organizations with large consumer bases have become more focused on educating consumers, partly in response to the FTC's "Red Flag Rule," which requires creditors and financial institutions to have identity theft prevention programs to detect and respond to activities that may be indicative of identity theft.

InformationWeek has published an in-depth report on smartphone security. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Dark Reading Tech Digest September 7, 2015
Some security flaws go beyond simple app vulnerabilities. Have you checked for these?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-05
system/session/drivers/cookie.php in Anchor CMS 0.9.x allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object in a cookie.

Published: 2015-10-05
The Secure Meeting (Pulse Collaboration) in Pulse Connect Secure (formerly Juniper Junos Pulse) before 7.1R22.1, 7.4, 8.0 before 8.0R11, and 8.1 before 8.1R3 provides different messages for attempts to join a meeting depending on the status of the meeting, which allows remote attackers to enumerate ...

Published: 2015-10-05
The Secure Meeting (Pulse Collaboration) in Pulse Connect Secure (formerly Juniper Junos Pulse) before 7.1R22.1, 7.4, 8.0 before 8.0R11, and 8.1 before 8.1R3 allows remote authenticated users to bypass intended access restrictions and log into arbitrary meetings by leveraging a meeting id and meetin...

Published: 2015-10-05
Heap-based buffer overflow in the parse_string function in libs/esl/src/esl_json.c in FreeSWITCH before 1.4.23 and 1.6.x before 1.6.2 allows remote attackers to execute arbitrary code via a trailing \u in a json string to cJSON_Parse.

Published: 2015-10-05
Unrestricted file upload in GLPI before 0.85.3 allows remote authenticated users to execute arbitrary code by adding a file with an executable extension as an attachment to a new ticket, then accessing it via a direct request to the file in files/_tmp/.

Dark Reading Radio
Archived Dark Reading Radio
What can the information security industry do to solve the IoT security problem? Learn more and join the conversation on the next episode of Dark Reading Radio.