Los Alamos Suspends Classified Research After Data DisappearsOfficials at the Los Alamos National Laboratory have put a halt to all classified research while they conduct an inventory of sensitive data, which will take at least several days. The disappearance of two removable data storage devices at the lab prompted the move, according to a report in The New York Times. The disappearance of the storage devices was discovered July 7 during preparations to run an experiment inthe lab’s weapons physics division.The University of California runs the Los Alamos lab, but Spencer Abraham, the secretary of engergy, decided last year to seek competitive bids after learning that some employees spent thousands of dollars of laboratory funds on personal items. In a statement, Abraham said yesterday, “The investigation to date indicates widespread disregard of security procedures by laboratory employees. This is absolutely unacceptable.”Read the full story in The New York Times. New Passenger Screening System PostponedFearing a backlash from privacy advocates during the November election, the Bush administration has decided to postpone and scale back the debut of a new airline passenger screening program. The system, known as the Cmputer Assisted Passenger Pre-Screening Program (or CAPPS II) will not be implemented until after the election, the Washington Post reports. Disagreements over parts of the program within the Department of Homeland Security also played a part in the delay. According to the Post, department officials could not say when the program would debut, nor could they say which components would be dropped or scaled back. James M. Loy, deputy secretary of Homeland Security, said that the program “remains, in my mind, one of the most important tools in the counterterrorism arsenal.” The program would use data sources from federal and private databases to assign a threat level to each passenger as he or she went through airport screening. Instead, the Post reports, the government will now confirm a passenger’s identification by asking for a valid driver’s license and then checking its authenticity with a commercial data service. Read the full story in the Washington Post.Bush Signs New ID Theft LawAs reported by several outlets, President Bush signed into law yesterday a measure that would add two years to prison sentences for those convicted in federal court of using stolen credit card numbers and other personal information to commit crimes. Bush said, “Like other forms of stealing, identity theft leaves victims poorer and feeling terribly violated.” According to a story in the Washington Post, identity theft topped the list of consumer fraud complaints to the Federal Trade Commission in 2003. Read the full report in the Washington Post.Bagle Copycat Hits Net Virus writers released a new version of the Bagle worm yesterday, built on source code of an earlier Bagle worm released earlier this month. According to The Register, the new variant, called Bagle-AF, will e-mail copies of itself to any e-mail addresses it finds on a compromised PC. It will also try to stop any security applications from running. Read the full report in The Register. Related content news Multibillion-dollar cybersecurity training market fails to fix the supply-demand imbalance Despite money pouring into programs around the world, training organizations have not managed to ensure employment for professionals, while entry-level professionals are finding it hard to land a job By Samira Sarraf Oct 02, 2023 6 mins CSO and CISO CSO and CISO CSO and CISO news Royal family’s website suffers Russia-linked cyberattack Pro-Russian hacker group KillNet took responsibility for the attack days after King Charles condemned the invasion of Ukraine. By Michael Hill Oct 02, 2023 2 mins DDoS Cyberattacks feature 10 things you should know about navigating the dark web A lot can be found in the shadows of the internet from sensitive stolen data to attack tools for sale, the dark web is a trove of risks for enterprises. Here are a few things to know and navigate safely. By Rosalyn Page Oct 02, 2023 13 mins Cybercrime Security news ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year Researchers from Group-IB believe it's likely the group is an independent affiliate working for multiple ransomware-as-a-service operations By Lucian Constantin Oct 02, 2023 4 mins Hacker Groups Ransomware Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe