AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 101-110 of 2625

TurboTax, H&R Block and TaxAct all Use This Security Feature. Why Doesn’t the IRS?

January 25, 2016 FROM NEXTGOV arrow Major online tax preparation firms, within months of customer account hacks, all required many users to sign on with passwords, plus codes delivered by text or email. But a year after crooks gamed IRS.gov to view 334,000 taxpayers' records, the agency says it will not be able to shift to...

Hackers Defraud TaxAct Customers, Snoop into U-Va. Personnel Data, and Breach Brigham and Women's Hospital

January 25, 2016 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: ID Thieves Access TaxAct Customers' Personal and Financial Data Fraudsters who apparently gamed TaxAct's identify verification controls compromised, and may have copied, personal and tax return information from hundreds of customers. In addition,...

NSA Director: Expect More Hacks As Big As the OPM Heist

January 22, 2016 FROM NEXTGOV arrow The head of the National Security Agency, who doubles as the Pentagon's cybersecurity lead, expects there will be more hacks as big as the Office of Personnel Management data heist. Grouping the OPM theft with a data compromise at health insurer Anthem that victimized 78.8 million people, Adm. Mike Rogers...

Here’s the Pentagon Policy for Going Undercover in Cyberspace

January 21, 2016 FROM NEXTGOV arrow This story has been updated with new information from the Defense Department. New government-sponsored YouTube videos caution feds and contractors to be wary of connecting with an individual on social media who they have never met in person, but seems to know a lot about them. Foreign spies abound on...

Hackers Breach Oregon Refuge Employee Data and Dump Car Breathalyzer’s Source Code

January 19, 2016 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Militia May Have Breached Federal Employee Data on Refuge Computers Oregon Public Radio, while inside the Malheur National Wildlife Refuge compound, observed militants interacting with computers that can only be accessed with employee...

The US Thinks China May Have Stolen Military Robot Designs

January 15, 2016 The federal government wants to know if hacked trade secrets are aiding the rise of an army of Chinese androids. At least one China-backed cyberspy operation reportedly snared robotics research from QinetiQ, a Pentagon contractor and the supposed inspiration for gadget-maker "Q" in the James Bond movie franchise. This week,...

US Hiring Researchers to See if China’s Military Robots Originate from Hacked Designs

January 15, 2016 FROM NEXTGOV arrow The federal government wants to know if hacked trade secrets are aiding the rise of an army of Chinese androids. At least one China-backed cyberspy operation reportedly snared robotics research from QinetiQ, a Pentagon contractor and the supposed inspiration for gadget-maker "Q" in the James Bond movie franchise. This week,...

Number of Deaths in Police Custody Higher than Media Reports: DOJ Data

January 14, 2016 FROM NEXTGOV arrow The story of police brutality playing out on city streets, in news accounts and on cellphone video footage has been missing one data point – a federal accounting of the problem. This spring, Justice Department-funded data scientists will present findings from a pilot project that, in essence, crowdsources facts on...

This Cyber ‘Safeguard’ Is Hurting US Defenses

January 13, 2016 A lawmaker from Virginia's high-tech corridor is pressing Congress to delete hacking tools from an international arms control agreement. The deal -- reached in 2013 -- bans multinational firms and cyber vendors from transmitting information about "intrusion software" across borders without first obtaining a license. When the Obama administration proposed...

DHS Cyber Czar, Tech Titans Tell Commerce to Rethink Hacking Arms Control

January 13, 2016 FROM NEXTGOV arrow A lawmaker from Virginia's high-tech corridor is pressing Congress to delete hacking tools from an international arms control agreement. The deal -- reached in 2013 -- bans multinational firms and cyber vendors from transmitting information about "intrusion software" across borders without first obtaining a license. When the Obama administration proposed...