10:01 AM

Symantec Warns Of Online Census Scams

The U.S. Census Bureau has no plans to collect any information over the Internet.

Security vendor Symantec is warning U.S. residents not to be duped by cyber criminals who may use the upcoming collection of information for the U.S. Census to steal personal information.

In a blog post, the security vendor advised people not to fill out anything online or click on any links in e-mails related to the census because those communications are likely to be fraudulent.

The U.S. government is expected to begin sending census forms via snail mail this month to every residence in the U.S. and Puerto Rico, according to the U.S. 2010 Web site. If forms are not returned in the time allotted, a census taker may pay a visit to a residence to collect information.

The U.S. Census Bureau does not plan to collect any resident information over the Internet, which is why Symantec is warning people not to respond immediately to anyone asking for it.

"The census will primarily be a paper and pencil process, with no part of the census form available to be filled out online," Symantec said in a blog post on its Security Response site. "So, we encourage computer users to be very wary of any online communications -- including emails and social networking messages -- that they receive regarding the census, particularly any that ask them to click on a link or URL, open an attachment or respond with personal information, because these could very likely be scams."

In particular, Symantec fears hackers may try to spread malware via links embedded in e-mails sent out to people asking them for information related to the census.

Symantec advises anyone receiving an e-mail related to the census to call the U.S. Census Bureau before taking any action.

The company also has posted a list of census questions in the blog post so people can better identify attempts at possible online fraud.

The U.S. takes a census to collect demographic information every 10 years. As it rapidly readies itself to count everyone in the country, the U.S. Census Bureau has tentatively begun tapping cloud computing to reduce the cost and accelerate delivery of its services to its employees and the public.

More information about the 2010 census can be found on the U.S. Census Bureau Web site.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-02-27
The seg_write_packet function in libavformat/segment.c in ffmpeg 2.1.4 and earlier does not free the correct memory location, which allows remote attackers to cause a denial of service ("invalid memory handler") and possibly execute arbitrary code via a crafted video that triggers a use after free.

Published: 2015-02-27
The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.

Published: 2015-02-27
Cross-site scripting (XSS) vulnerability in Unified Web Interaction Manager in Cisco Unified Web and E-Mail Interaction Manager allows remote attackers to inject arbitrary web script or HTML via vectors related to a POST request, aka Bug ID CSCus74184.

Published: 2015-02-27
Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.

Published: 2015-02-27
checkpw 1.02 and earlier allows remote attackers to cause a denial of service (infinite loop) via a -- (dash dash) in a username.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.