AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 1-10 of 2080

Hackers Compromise iPhone Ads, Go Incognito 12 Years in Europe, and Infect Bloggers

September 19, 2014 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Ebay Man-In-the-Middle Attack Puts Customer Credentials At Risk Hackers compromised some listings in the online marketplace in a way that redirects shoppers to a site that can steal their personal information. Largest IRC ...

NCI Seals $41 Million Deal to Support Army Cyber Ops

September 19, 2014 FROM NEXTGOV arrow NCI Information Systems has nabbed a contract worth up to $41 million to support Army cyber network operations at a command that recently activated the service's first-ever cyber protection brigade, according to Pentagon officials. The Reston, Virginia-based contractor will work with the Network Enterprise Technology Command, or NETCOM, G-5 on ...

China Wants To Replicate NSA’s Cyber Schools

September 18, 2014 Chinese universities are welcome to adopt the U.S. National Security Agency's cyber education program, the top U.S. computer security education official said, after a recent trip to Beijing. Entrepreneurs in China have voiced support for improving the notoriously spotty relations between the U.S. and China in cyberspace by patterning Chinese ...

Uncle Sam Drops $3M in Grants to Kill the Password

September 18, 2014 FROM NEXTGOV arrow The nation's wireless carriers, the state of North Carolina and several online stores have been awarded $3 million in federal grants to do away with passwords and offer consumers other options to securely access online services, Commerce Department officials have announced. The National Strategy for Trusted Identities in Cyberspace is ...

US Official: Chinese Want NSA Cyber Schools. Really.

September 17, 2014 FROM NEXTGOV arrow Chinese universities are welcome to adopt the U.S. National Security Agency's cyber education program, the top U.S. computer security education official said, after a recent trip to Beijing. Entrepreneurs in China have voiced support for improving the notoriously spotty relations between the U.S. and China in cyberspace by patterning Chinese ...

EXCLUSIVE: New Connect.gov Aims to Consolidate Your Passwords

September 15, 2014 FROM NEXTGOV arrow With high-profile hacks exposing the futility of passwords, alternatives such as biometric identification and two-step verification are gaining popularity. Waiting in the wings is a login network that could grant users access to many of their Internet accounts with a single registration. The National Strategy for Trusted Identities in Cyberspace ...

Hackers Blackmail Bitcoin Inventor, Corrupt Brazilian Newspaper

September 12, 2014 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Hacker Holds Mysterious Bitcoin Inventor’s Identity for Ransom A person going by the name “Jeffrey” has usurped an email account belonging to the virtual currency’s secretive founder, Satoshi Nakamoto, saying he will sell ...

Skyping Fake Bomb Threats in the Name of ISIS Not a Wise Move

September 12, 2014 FROM NEXTGOV arrow U.S. authorities have charged a 21-year-old Connecticut resident for his involvement in false VoIP calls warning of impending violence against Americans, according to a newly unsealed FBI affidavit. Matthew Tollis was arrested Wednesday on federal accusations of "swatting," the practice of calling 911 to elicit a SWAT team or other ...

Things Can Go Kaboom When a Defense Contractor's 3-D Printer Gets Hacked

September 11, 2014 FROM NEXTGOV arrow Defense companies that manufacture parts with three-dimensional printers using metal powders might want to heed forthcoming government-issued standards for preventing hacks. Not only can attackers steal proprietary designs by breaching the machines’ data files – but they can also cause physical damage to production plants and employees. "A compromise may ...

Why QR Code Readers Could Replace Pen-and-Paper Signatures at Some Agencies

September 10, 2014 FROM NEXTGOV arrow While Apple foresees consumers soon charging their groceries with the tap of an iPhone, Verizon is banking on federal agency employees soon being able to sign confidential contracts with the tap of any smartphone. The telecommunications giant – the first firm certified to offer high-level online identity protection for federal ...