AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 21-30 of 2060

Who Receives Hacker Threat Info From DHS?

August 11, 2014 FROM NEXTGOV arrow Health care, banking and other key sectors at risk of cyberattacks have not joined a Department of Homeland Security program required to offer these industries protections against a potential catastrophic hack, according to federal inspectors. President Obama ordered in early 2013 that DHS expand an information-sharing program once restricted to ...

Will The Government Shred Your Contract After a Hack?

August 8, 2014 FROM NEXTGOV arrow Contractors are concerned they might lose government business for coming forward about suspected internal data breaches, after the unprecedented decision by two departments to halt contracts with a hacked background investigation firm. It is believed the personal information of Department of Homeland Security employees likely was compromised when a suspected ...

Hackers Hack Back China, Aim for Gizmodo Gadget Lovers and Hijack the Internet

August 8, 2014 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Activists broadcast anti-Communist messages on Chinese TV Residents in Wenzhou, a city in eastern Zhejiang province, had their normal television programming interrupted the night of Aug. 1 -- possibly by hacktivists who operate ...

The CIA Can’t Hack Senate Computers Because They Own Them, Experts Say

August 7, 2014 CIA personnel probably didn’t commit a hacking crime by rummaging through congressional computers used to research the agency's torture activities, former federal attorneys and scholars say. Some lawmakers are calling for a criminal probe into new findings by a CIA inspector general that the agency improperly searched Senate intelligence committee ...

CIA Didn’t Really Hack Senate Computers

August 6, 2014 FROM NEXTGOV arrow CIA personnel probably didn’t commit a hacking crime by rummaging through congressional computers used to research the agency's torture activities, former federal attorneys and scholars say. Some lawmakers are calling for a criminal probe into new findings by a CIA inspector general that the agency improperly searched Senate intelligence committee ...

Federal Computers Could Be Infected By Invisible Malware

August 5, 2014 A surge of malicious software hit news media websites during the first half of 2014, unleashing a threat to federal agencies that rely on those sites to get information, cybersecurity researchers say. Media networks were almost four times as likely to attract malware as the average enterprise network, likely because ...

Invisible Web Infection Poses Threat to Federal Computers

August 5, 2014 FROM NEXTGOV arrow A surge of malicious software hit news media websites during the first half of 2014, unleashing a threat to federal agencies that rely on those sites to get information, cybersecurity researchers say. Media networks were almost four times as likely to attract malware as the average enterprise network, likely because ...

Getting on a U.S. Military Base Will Now Include an FBI Background Check

August 4, 2014 Members of the defense community, starting this Friday, automatically will be screened against the FBI's criminal database when they try enter military installations and pulled aside if the system shows an arrest, felony or outstanding warrant. The new Defense Department tool is part of a larger, governmentwide effort to continuously ...

Getting on Military Bases Is About to Involve FBI Background Checks

August 4, 2014 FROM NEXTGOV arrow Members of the defense community, starting this Friday, automatically will be screened against the FBI's criminal database when they try enter military installations and pulled aside if the system shows an arrest, felony or outstanding warrant. The new Defense Department tool is part of a larger, governmentwide effort to continuously ...

Hackers Take Aim at Hong Kong, Kenya and the Philippines

August 1, 2014 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Pro-democracy donor hacked in Hong Kong Media baron Jimmy Lai Chee-ying, publisher of the forthright Apple Daily and Next magazines, allegedly was the target of cyberspies. After arrest, crooks claim hospital’s laptop is ...