10:01 AM
Connect Directly

Symantec Warns Of Online Census Scams

The U.S. Census Bureau has no plans to collect any information over the Internet.

Security vendor Symantec is warning U.S. residents not to be duped by cyber criminals who may use the upcoming collection of information for the U.S. Census to steal personal information.

In a blog post, the security vendor advised people not to fill out anything online or click on any links in e-mails related to the census because those communications are likely to be fraudulent.

The U.S. government is expected to begin sending census forms via snail mail this month to every residence in the U.S. and Puerto Rico, according to the U.S. 2010 Web site. If forms are not returned in the time allotted, a census taker may pay a visit to a residence to collect information.

The U.S. Census Bureau does not plan to collect any resident information over the Internet, which is why Symantec is warning people not to respond immediately to anyone asking for it.

"The census will primarily be a paper and pencil process, with no part of the census form available to be filled out online," Symantec said in a blog post on its Security Response site. "So, we encourage computer users to be very wary of any online communications -- including emails and social networking messages -- that they receive regarding the census, particularly any that ask them to click on a link or URL, open an attachment or respond with personal information, because these could very likely be scams."

In particular, Symantec fears hackers may try to spread malware via links embedded in e-mails sent out to people asking them for information related to the census.

Symantec advises anyone receiving an e-mail related to the census to call the U.S. Census Bureau before taking any action.

The company also has posted a list of census questions in the blog post so people can better identify attempts at possible online fraud.

The U.S. takes a census to collect demographic information every 10 years. As it rapidly readies itself to count everyone in the country, the U.S. Census Bureau has tentatively begun tapping cloud computing to reduce the cost and accelerate delivery of its services to its employees and the public.

More information about the 2010 census can be found on the U.S. Census Bureau Web site.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-10-30
Directory traversal vulnerability in Dell EqualLogic PS4000 with firmware 6.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the default URI.

Published: 2014-10-30
Buffer overflow in ALLPlayer 5.6.2 through 5.8.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in a .m3u (playlist) file.

Published: 2014-10-30
SQL injection vulnerability in wcm/system/pages/admin/getnode.aspx in BSS Continuity CMS 4.2.22640.0 allows remote attackers to execute arbitrary SQL commands via the nodeid parameter.

Published: 2014-10-30
The SamlHeaderInHandler in Apache CXF before 2.6.11, 2.7.x before 2.7.8, and 3.0.x before 3.0.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted SAML token in the authorization header of a request to a JAX-RS service.

Published: 2014-10-30
Apache WSS4J before 1.6.17 and 2.x before 2.0.2, as used in Apache CXF 2.7.x before 2.7.13 and 3.0.x before 3.0.2, when using TransportBinding, does properly enforce the SAML SubjectConfirmation method security semantics, which allows remote attackers to conduct spoofing attacks via unspecified vect...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.