Risk
3/1/2010
10:01 AM
50%
50%

Symantec Warns Of Online Census Scams

The U.S. Census Bureau has no plans to collect any information over the Internet.

Security vendor Symantec is warning U.S. residents not to be duped by cyber criminals who may use the upcoming collection of information for the U.S. Census to steal personal information.

In a blog post, the security vendor advised people not to fill out anything online or click on any links in e-mails related to the census because those communications are likely to be fraudulent.

The U.S. government is expected to begin sending census forms via snail mail this month to every residence in the U.S. and Puerto Rico, according to the U.S. 2010 Web site. If forms are not returned in the time allotted, a census taker may pay a visit to a residence to collect information.

The U.S. Census Bureau does not plan to collect any resident information over the Internet, which is why Symantec is warning people not to respond immediately to anyone asking for it.

"The census will primarily be a paper and pencil process, with no part of the census form available to be filled out online," Symantec said in a blog post on its Security Response site. "So, we encourage computer users to be very wary of any online communications -- including emails and social networking messages -- that they receive regarding the census, particularly any that ask them to click on a link or URL, open an attachment or respond with personal information, because these could very likely be scams."

In particular, Symantec fears hackers may try to spread malware via links embedded in e-mails sent out to people asking them for information related to the census.

Symantec advises anyone receiving an e-mail related to the census to call the U.S. Census Bureau before taking any action.

The company also has posted a list of census questions in the blog post so people can better identify attempts at possible online fraud.

The U.S. takes a census to collect demographic information every 10 years. As it rapidly readies itself to count everyone in the country, the U.S. Census Bureau has tentatively begun tapping cloud computing to reduce the cost and accelerate delivery of its services to its employees and the public.

More information about the 2010 census can be found on the U.S. Census Bureau Web site.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-4293
Published: 2015-07-30
The packet-reassembly implementation in Cisco IOS XE 3.13S and earlier allows remote attackers to cause a denial of service (CPU consumption or packet loss) via fragmented (1) IPv4 or (2) IPv6 packets that trigger ATTN-3-SYNC_TIMEOUT errors after reassembly failures, aka Bug ID CSCuo37957.

CVE-2014-7912
Published: 2015-07-29
The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory c...

CVE-2014-7913
Published: 2015-07-29
The print_option function in dhcp-common.c in dhcpcd through 6.9.1, as used in dhcp.c in dhcpcd 5.x in Android before 5.1 and other products, misinterprets the return value of the snprintf function, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corru...

CVE-2015-2977
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to create arbitrary files, and consequently execute arbitrary code, via unspecified vectors.

CVE-2015-2978
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to bypass authentication and complete a conference-room reservation via unspecified vectors, as demonstrated by an "unintentional reservation."

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!