Short on time? Here’s how to fix the Bing redirect issue in Chrome in 2022:
- Uninstall Apps/Extensions. Remove any apps or extensions you’ve recently installed, then reset Chrome to its default settings.
- Scan Device. Run a full system scan with a high-quality antivirus (Norton is the best).
- Remove Virus. After the scan is complete, let the antivirus remove all instances of malware.
- Stay Protected. Protect yourself from further infections with a high-quality internet security package (again, Norton is the best).
If Google Chrome is redirecting to Bing, then you may have a browser hijacker interfering with Chrome’s settings. Browser hijackers are typically hidden inside potentially unwanted programs (PUPs) that come packaged with freeware downloads or pirated content. Some Chrome extensions are actually browser hijackers that are disguised as useful extensions.
You need to uninstall browser hijackers as soon as possible. While they don’t harm your PC, they’re probably collecting your personal information (such as your browsing history) and selling it to advertisers. They can also redirect your browser to unsafe sites that contain malware downloads and exploit attacks.
Since you don’t know which PUP is causing the Bing redirect issue, you should remove any suspicious extensions and uninstall any recently installed applications. Then, reset Chrome back to its default settings.
Once you’ve removed any suspicious applications, run a full system scan of your PC using your chosen antivirus. Many of the top antiviruses can flag PUPs and browser hijackers in addition to more dangerous malware threats like rootkits, ransomware, and trojans. There’s no way of knowing how many other malware infections you have without running a full scan.
Quick Tip: Norton is the best antivirus software in 2022. You can get an affordable Norton plan for just $19.99 / year, and there’s a 60-day money-back guarantee on all purchases.
Preliminary Step — Remove Recently Installed Extensions and Applications
Here’s how to remove suspicious extensions from Chrome, uninstall recently installed applications on Windows, Mac, and Linux, and reset Chrome to its default settings:
- Remove Suspicious Extensions From Chrome.
- Uninstall Recently Installed Applications on Windows 11.
- Uninstall Recently Installed Applications on Windows 10.
- Uninstall Recently Installed Applications on Windows 8.
- Uninstall Recently Installed Applications on Windows 7.
- Uninstall Recently Installed Applications on Mac.
- Uninstall Recently Installed Applications on Linux (Ubuntu).
- Reset Chrome to Its Default Settings.
Remove Suspicious Extensions From Chrome
If you’re removing Chrome extensions, first you need to see which extensions are installed on your browser:
- At the top right corner of your Chrome browser, click the 3 dot symbol.
- Select More tools and then Extensions.
- Click Remove on any extension that could be a browser hijacker.
- Confirm by clicking Remove again.
You’re only getting started, though. Many malware files can change the settings of your Chrome extensions to harvest your data or redirect your browser to unsafe sites. If you’re having Bing redirect issues with Chrome, you still need to remove unsafe applications on your device. You can then run a malware scan to clean any malware from your system.
Uninstall Recently Installed Applications on Windows 11
Click the start button on your taskbar, then type Uninstall into the search field.
Click Add or remove programs.
Sort the App list by Install date.
Then, click the 3 dots to the right of any recently installed programs you don’t trust and click Uninstall.
Follow any uninstallation wizards, then reset Chrome to its default settings.
Uninstall Recently Installed Applications on Windows 10
Click on your Start menu, then click Settings.
In the next window, click Apps. Then click Sort by and choose Install Date.
Scroll through the list of installed apps, and click Uninstall on any apps you don’t trust. Wait for the uninstallations to finish, and then reset Chrome to its default settings.
Uninstall Recently Installed Applications on Windows 8
Bring up Windows 8’s Live Tile view by pressing the Start key on your keyboard.
Without clicking any tiles, type Control Panel and click the Control Panel button on the right side of your screen.
In the next window, click Uninstall a program.
Note: If you can’t see Uninstall a program, chances are you don’t have the control panel set to Category. Click the dropdown list next to View by and set the control panel to Category.
Click the Organize button, and arrange the installed app list by Install Date.
Scroll down your list of installed programs and click Uninstall on any suspicious programs. Wait for the uninstallations to finish, then reset Chrome to its default settings.
Uninstall Recently Installed Applications on Windows 7
Bring up your Start menu and click Control Panel.
In the next window, click Uninstall a program.
Note: If you can’t see Uninstall a program, chances are you don’t have the control panel set to Category. Click the dropdown list next to View by and set it to Category.
Click the Organize button, and arrange the installed app list by Install Date.
Scroll through your list of installed programs and click Uninstall on any suspicious programs. Wait for the uninstallations to finish, and then reset Chrome to its default settings.
Uninstall Recently Installed Applications on Mac
Go to your Mac’s dock, and open Finder.
Click Applications in the new window — it’s usually under Favorites.
Make sure you’re in List view.
Open the View drop-down menu and click Show View Options.
Check the option Date Modified, then click on the top of the new column in the main window to arrange your apps by install date.
Scroll down your list of apps and drag any you don’t trust over the trash icon on your Mac’s dock. Drop them in.
When done, hold the dock icon and click on Empty Trash when it appears.
You’re now ready to reset Chrome to its default settings.
Uninstall Recently Installed Applications on Linux (Ubuntu)
Open Ubuntu Software Center and click on the Installed tab.
Scroll through the list of installed applications, looking for any applications you don’t trust. If you know the app by name, you can also search for it.
Click on any suspicious apps, then click the Remove button. Enter your account password to confirm the action, then open Chrome to begin restoring it to its default settings.
Reset Chrome to Its Default Settings
Open Google Chrome. Click the 3 vertical dots in the top right corner, then click Settings.
Click Advanced, then click Reset and clean up.
Next, click Restore settings to their original defaults.
Doing this will completely reset Chrome, including the search settings that the web hijacker changed. It will also disable any extensions, but it won’t remove extensions, bookmarks, search history, or saved passwords. This is why it’s important to remove any unsafe or suspicious extensions beforehand.
Once this is done, scan your computer to make sure you have no malware infections.
Step 1. Identify Potential Malware With Your Antivirus
Unplug any USB devices, as malware may replicate onto them. Then, in your chosen antivirus, initiate a full-system scan. The full-system scan will go through your computer and quarantine any instances of malware it detects (including whatever may have been hijacking Google Chrome).
The scan can take a long time, so you’ll have to be patient until it completes. If you see any malware appear in the list, don’t cancel the scan thinking you’re safe, because there could be other infections on your computer.
Some cloud-based scanners (like Bitdefender) won’t slow your computer down while scanning. However, if you’re worried about system slowdown, you should schedule the scan for when you won’t be using CPU-intensive apps on your computer.
When the scan is finished, you’re ready for step 2.
Step 2. Remove the Malware and Delete Any Other Infected Files
Scroll through the infected file list and remove the flagged malware files. There might be false positives in the list (safe files your antivirus has wrongly flagged as malware). If you’re an advanced user, you’ll recognise these and can whitelist them. If not, ask your antivirus’s support team before deciding on whether to keep a file.
Restart your computer, then run a second full disk scan. The second full disk scan will complete much more quickly than the first, and it shouldn’t find any threats. If it does, you need to repeat steps 1 and 2 until you can scan your computer without any threats appearing in the infected file list. When no more threats appear, you can move on to step 3.
Step 3. Keep Your Device Protected From Other Unwanted Programs
Your device is now malware-free, but you need to take the necessary precautions so you don’t get reinfected. Here’s what you should do.
Keep Your Software, OS, and Drivers Up-To-Date
First, you need to keep everything on your computer up-to-date. Hackers are great at exploiting any weaknesses in out-of-date software. An antivirus solution like TotalAV includes a vulnerability scanner that can detect these vulnerabilities for you.
You should also make sure any system updates are completed. This includes optional updates, which often contain security fixes to prevent exploit attacks.
Finally, make sure applications have their auto-update option enabled — especially for your operating system. Windows and macOS both have an auto-update option, and you can turn automatic updates on in most applications’ settings. Mac users can also enable all apps to auto-update in Apple’s App Store.
Don’t Download Suspicious Files
When you download suspicious files from untrustworthy websites, you place yourself at risk of getting malware. You should only download files from websites you trust, and you should avoid pirating because illegal content is a good avenue for a virus attack.
You should also be careful when clicking on links or opening email attachments. Emails are one of the most common ways that viruses spread. Make sure you always recognize an email sender, and if you don’t, mark the email as spam.
If you recognize the sender but weren’t expecting an attachment from them, get in touch to ask them if they sent the file in question. If it’s a person you know, they may be a victim of a cyber attack. This means their email has been hacked to send out phishing links or malware files to trusted contacts.
You should also be suspicious of legitimate-seeming emails from businesses. Many cybercriminals disguise themselves as businesses to try to trick you into giving away personal information or downloading malware.
Whenever you download files online, make sure you’re running a secure and trustworthy antivirus with real-time protection, such as Norton. A trustworthy antivirus can intercept malware in real-time before it has the chance to damage your computer.
Secure Your Wireless Network and IoT Devices
Hackers can take advantage of unsecured wireless networks and IoT (Internet of Things) devices. Hackers can steal your bandwidth, hack into your wireless-connected devices, or run cryptojackers and botnets off hacked networks and IoT devices.
Note: you can check if a network is secured or not by looking in your wireless network list. An unsecured network will have a warning next to it.
To secure your wireless network, log into your router through your desktop or mobile device and make a secure password for your network. If you’re not sure how to do this, contact your router’s customer support team or look up the model number online. For help with creating a strong password, use a secure password manager like Dashlane. Dashlane can generate a password that uses a mix of numbers, letters, and symbols, which is hard for hackers to crack.
IoT devices you might have in your home include:
- Smart speakers.
- Doorbell cameras.
- Baby monitors.
- Smoke detectors.
- Door locks.
If these devices aren’t secured, then hackers can take control of them just as easily as you can. To ensure they are secure, look up the model number of your IoT device online and find out how to add a password to it. Once you know how to secure the IoT device, you can use one of our top password managers of 2022 to set a password.
Download a Secure Antivirus Program
Finally, you need to download a secure antivirus program. A good antivirus suite will protect you from malware and provide a ton of additional security features for all your devices. Norton 360 is a great example of a secure and trustworthy antivirus program. It includes all of the most important internet security features in 2022, including:
- Real-time scanner. Scans your computer and any downloads in real-time to prevent infections before they can cause damage.
- Firewall. Monitors and blocks unauthorized network connections.
- Secure VPN. Spoofs your location, making it hard for trackers to see where you are.
- Parental controls. Protects your kids by introducing content filters and screen time monitoring.
- Cloud backup. Stores important files on Norton’s cloud network to protect you from ransomware attacks or data loss.
- ID protection (US only). Monitors credit reports and alerts you to any changes.
Frequently Asked Questions about the Bing Redirect Issue in Chrome
Why does my Google Chrome keep redirecting to Bing?
If Google Chrome keeps redirecting to Bing, then you most likely have a web hijacker infecting your computer and altering Google Chrome’s settings. You need to uninstall recently installed extensions and apps, then scan your PC with a secure antivirus scanner like Norton.
How do I fix Bing redirect in Chrome?
The best way to fix the Bing redirect issue is to uninstall recently installed extensions and apps, then scan your PC using a secure antivirus scanner. This will remove any PUPs that may contain the browser hijacker interfering with Chrome. It will also remove any other malware that is affecting your PC. I recommend checking out our top 10 list of antiviruses in 2022 for a trustworthy and secure antivirus suite.
How do I stop browser hijacking?
If you’re constantly dealing with browser hijacking, you need to start using a more secure browser, or stop engaging in unsafe activity online. Alternatively, you can get a secure antivirus that can protect you from the latest malware. If you’re dealing with a browser hijacker now, follow my steps above for cleaning up your browser. Then download a secure antivirus program like Norton 360 to remove the malware on your device and protect you from future browser hijacker attacks.