Risk
3/1/2010
10:01 AM
50%
50%

Symantec Warns Of Online Census Scams

The U.S. Census Bureau has no plans to collect any information over the Internet.

Security vendor Symantec is warning U.S. residents not to be duped by cyber criminals who may use the upcoming collection of information for the U.S. Census to steal personal information.

In a blog post, the security vendor advised people not to fill out anything online or click on any links in e-mails related to the census because those communications are likely to be fraudulent.

The U.S. government is expected to begin sending census forms via snail mail this month to every residence in the U.S. and Puerto Rico, according to the U.S. 2010 Web site. If forms are not returned in the time allotted, a census taker may pay a visit to a residence to collect information.

The U.S. Census Bureau does not plan to collect any resident information over the Internet, which is why Symantec is warning people not to respond immediately to anyone asking for it.

"The census will primarily be a paper and pencil process, with no part of the census form available to be filled out online," Symantec said in a blog post on its Security Response site. "So, we encourage computer users to be very wary of any online communications -- including emails and social networking messages -- that they receive regarding the census, particularly any that ask them to click on a link or URL, open an attachment or respond with personal information, because these could very likely be scams."

In particular, Symantec fears hackers may try to spread malware via links embedded in e-mails sent out to people asking them for information related to the census.

Symantec advises anyone receiving an e-mail related to the census to call the U.S. Census Bureau before taking any action.

The company also has posted a list of census questions in the blog post so people can better identify attempts at possible online fraud.

The U.S. takes a census to collect demographic information every 10 years. As it rapidly readies itself to count everyone in the country, the U.S. Census Bureau has tentatively begun tapping cloud computing to reduce the cost and accelerate delivery of its services to its employees and the public.

More information about the 2010 census can be found on the U.S. Census Bureau Web site.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6090
Published: 2015-04-27
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) DataMappingEditorCommands, (2) DatastoreEditorCommands, and (3) IEGEditorCommands servlets in IBM Curam Social Program Management (SPM) 5.2 SP6 before EP6, 6.0 SP2 before EP26, 6.0.3 before 6.0.3.0 iFix8, 6.0.4 before 6.0.4.5 iFix...

CVE-2014-6092
Published: 2015-04-27
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause...

CVE-2015-0113
Published: 2015-04-27
The Jazz help system in IBM Rational Collaborative Lifecycle Management 4.0 through 5.0.2, Rational Quality Manager 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Team Concert 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Requirements Composer 4.0 through 4.0.7, Rational DOORS Next Generation...

CVE-2015-0174
Published: 2015-04-27
The SNMP implementation in IBM WebSphere Application Server (WAS) 8.5 before 8.5.5.5 does not properly handle configuration data, which allows remote authenticated users to obtain sensitive information via unspecified vectors.

CVE-2015-0175
Published: 2015-04-27
IBM WebSphere Application Server (WAS) 8.5 Liberty Profile before 8.5.5.5 does not properly implement authData elements, which allows remote authenticated users to gain privileges via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.