Nextgov - Authors - Aliya Sternsteinhttp://www.nextgov.comAliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as <em>National Journal's Technology Daily</em>, <em>Federal Computer Week</em> and <em>Forbes</em>. Before joining <em>Government Executive</em>, Sternstein covered agriculture and derivatives trading for <em>Congressional Quarterly</em>. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.en-usThu, 18 Sep 2014 08:45:38 -0400Uncle Sam Drops $3M in Grants to Kill the Passwordhttp://www.nextgov.com/cybersecurity/2014/09/uncle-sam-drops-3-million-kill-password/94448/Login alternatives to be tested include smartphone SIM cards and driver's licenses.Aliya Sternstein and Jack MooreThu, 18 Sep 2014 08:45:38 -0400http://www.nextgov.com/cybersecurity/2014/09/uncle-sam-drops-3-million-kill-password/94448/CybersecurityBrian A Jackson/Shutterstock.comUS Official: Chinese Want NSA Cyber Schools. Really.http://www.nextgov.com/cybersecurity/2014/09/us-official-chinese-want-nsa-cyber-schools-really/94382/The offer of shared cybersecurity training comes at a time when both countries are exchanging accusations of hacking each other’s trade secrets.Aliya SternsteinWed, 17 Sep 2014 17:14:49 -0400http://www.nextgov.com/cybersecurity/2014/09/us-official-chinese-want-nsa-cyber-schools-really/94382/CybersecurityCyber security analysts work in the "watch and warning center" during the first tour of the government’s secretive cyber defense lab, in Idaho Falls, Idaho. Mark J. Terrill/AP File PhotoEXCLUSIVE: New Connect.gov Aims to Consolidate Your Passwordshttp://www.nextgov.com/cybersecurity/2014/09/new-connectgov-aims-consolidate-your-passwords/94154/VA.gov, other federal sites will accept universal credentials starting this fall.Aliya SternsteinMon, 15 Sep 2014 18:01:55 -0400http://www.nextgov.com/cybersecurity/2014/09/new-connectgov-aims-consolidate-your-passwords/94154/CybersecurityFlorida3d/Shutterstock.comHackers Blackmail Bitcoin Inventor, Corrupt Brazilian Newspaperhttp://www.nextgov.com/cybersecurity/2014/09/hackers-blackmail-bitcoin-inventor-corrupt-brazilian-newspaper-tarnish-vn/94028/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 12 Sep 2014 17:21:47 -0400http://www.nextgov.com/cybersecurity/2014/09/hackers-blackmail-bitcoin-inventor-corrupt-brazilian-newspaper-tarnish-vn/94028/CybersecurityJulia Zakharova/Shutterstock.comSkyping Fake Bomb Threats in the Name of ISIS Not a Wise Movehttp://www.nextgov.com/defense/2014/09/skyping-fake-bomb-threats-name-isis-not-wise-move/94016/21-year-old Connecticut gamer arrested for "swatting" schools nationwide.Aliya SternsteinFri, 12 Sep 2014 16:53:17 -0400http://www.nextgov.com/defense/2014/09/skyping-fake-bomb-threats-name-isis-not-wise-move/94016/DefenseGil C/Shutterstock.comThings Can Go Kaboom When a Defense Contractor's 3-D Printer Gets Hackedhttp://www.nextgov.com/cybersecurity/2014/09/heres-why-you-dont-want-your-3-d-printer-get-hacked/93923/Military vendors that print with metal powders should heed forthcoming NIST security standards.Aliya SternsteinThu, 11 Sep 2014 17:46:47 -0400http://www.nextgov.com/cybersecurity/2014/09/heres-why-you-dont-want-your-3-d-printer-get-hacked/93923/CybersecurityMakerBot Replicator 2X 3D desktop printer is on display at the MakeBot booth at the International Consumer Electronics Show in Las Vegas.Jae C. Hong/APWhy QR Code Readers Could Replace Pen-and-Paper Signatures at Some Agencieshttp://www.nextgov.com/mobile/2014/09/why-qr-code-readers-could-replace-pen-and-paper-signatures-some-agencies/93716/Verizon ID service makes it possible to ink contracts or access government watch lists by pointing phones at QR codes.Aliya SternsteinWed, 10 Sep 2014 16:43:43 -0400http://www.nextgov.com/mobile/2014/09/why-qr-code-readers-could-replace-pen-and-paper-signatures-some-agencies/93716/MobileAndrey_Popov/Shutterstock.comReport: Agencies Aren’t Properly Vetting All Cyber Contractorshttp://www.nextgov.com/cybersecurity/2014/09/agencies-contractor-employees-cyber-workforce/93620/Most departments failed to assess whether IT vendors took security precautions.Aliya SternsteinTue, 09 Sep 2014 17:01:37 -0400http://www.nextgov.com/cybersecurity/2014/09/agencies-contractor-employees-cyber-workforce/93620/CybersecuritySOMMAI/Shutterstock.comWH Official: Cyber Coverage Will Be a Basic Insurance Policy By 2020http://www.nextgov.com/cybersecurity/2014/09/wh-official-cyber-coverage-will-be-basic-insurance-policy-2020/93503/Necessary data on likelihood of breaches and the cost of hacks are becoming all too clear.Aliya SternsteinMon, 08 Sep 2014 20:45:00 -0400http://www.nextgov.com/cybersecurity/2014/09/wh-official-cyber-coverage-will-be-basic-insurance-policy-2020/93503/CybersecurityTashatuvango/Shutterstock.comHackers Uncover Pakistanis’ Finances, Bug Korean Hacks and Exploit Celebshttp://www.nextgov.com/cybersecurity/2014/09/hackers-uncover-pakistanis-finances-bug-korean-hacks-and-exploit-celebs/93296/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinSun, 07 Sep 2014 20:14:35 -0400http://www.nextgov.com/cybersecurity/2014/09/hackers-uncover-pakistanis-finances-bug-korean-hacks-and-exploit-celebs/93296/CybersecurityPeople use the Internet at a local cafe in Islamabad, Pakistan.B.K. Bangash/APIs It Worth Creating a Pay Scale for Federal Cyber Pros?http://www.nextgov.com/cio-briefing/wired-workplace/2014/09/it-worth-creating-pay-scale-federal-cyber-pros/93281/Federal auditors think so, but the Office of Personnel Management says the field is still evolving.Aliya SternsteinFri, 05 Sep 2014 15:49:45 -0400http://www.nextgov.com/cio-briefing/wired-workplace/2014/09/it-worth-creating-pay-scale-federal-cyber-pros/93281/CIO Briefing - Wired WorkplaceHermin/Shutterstock.comHow Do Agencies Feel About iCloud?http://www.nextgov.com/mobile/2014/09/how-agencies-feel-about-icloud/93185/Some federal agencies have given the personal cloud service a wide berth for years.Aliya SternsteinThu, 04 Sep 2014 16:36:04 -0400http://www.nextgov.com/mobile/2014/09/how-agencies-feel-about-icloud/93185/Mobilegst/Shutterstock.comEnergy Races to Build Quantum Encryption – for Citizenshttp://www.nextgov.com/cybersecurity/2014/09/energy-races-build-quantum-encryption-citizens/93038/At the same time, NSA and nation states race to crack conventional secret codes with quantum computers.Aliya SternsteinWed, 03 Sep 2014 16:05:06 -0400http://www.nextgov.com/cybersecurity/2014/09/energy-races-build-quantum-encryption-citizens/93038/CybersecurityD-Wave Systems, Inc.'s DWave 128chip for quantum computing. Wikimedia CommonsWhat Does Alleged iCloud Hack Mean For Federal Agencies?http://www.nextgov.com/cybersecurity/2014/09/what-does-alleged-icloud-hack-mean-agencies/92957/Federal employees could be uploading sensitive information when they work on their personally owned iPhones.Aliya SternsteinTue, 02 Sep 2014 19:27:45 -0400http://www.nextgov.com/cybersecurity/2014/09/what-does-alleged-icloud-hack-mean-agencies/92957/CybersecurityGil C/Shutterstock.comHackers Score IDs of S. Korean Population, Roil New Zealand Election and Drain Norwegian Oilhttp://www.nextgov.com/cybersecurity/2014/08/hackers-score-ids-s-korean-population-roil-new-zealand-election-and-drain-norwegian-oil/92717/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 29 Aug 2014 16:19:50 -0400http://www.nextgov.com/cybersecurity/2014/08/hackers-score-ids-s-korean-population-roil-new-zealand-election-and-drain-norwegian-oil/92717/CybersecuritySean Pavone/Shutterstock.comObama Resurrects Intel Advisory Panelhttp://www.nextgov.com/defense/2014/08/obama-resurrects-intel-advisory-panel/92783/President Obama named six new members to the board -- including the CEO of UPS.Aliya SternsteinFri, 29 Aug 2014 16:05:11 -0400http://www.nextgov.com/defense/2014/08/obama-resurrects-intel-advisory-panel/92783/DefenseChuck Burton/APDHS Official: Create a Governmentwide Seal of Approval for Appshttp://www.nextgov.com/mobile/2014/08/dhs-official-create-governmentwide-seal-approval-apps/92564/Gmail and other mobile tools would undergo uniform screening, similar to the FedRAMP cloud certification program.Aliya SternsteinWed, 27 Aug 2014 16:21:51 -0400http://www.nextgov.com/mobile/2014/08/dhs-official-create-governmentwide-seal-approval-apps/92564/MobileOleksiy Mark/Shutterstock.comPolice Allegedly Vetted Dates Using Law Enforcement Databasehttp://www.nextgov.com/cybersecurity/2014/08/police-allegedly-vet-dates-using-law-enforcement-database/92474/While working at an investigations bureau in California, cops visited dating websites Tinder, eHarmony and Match.com.Aliya SternsteinTue, 26 Aug 2014 17:19:06 -0400http://www.nextgov.com/cybersecurity/2014/08/police-allegedly-vet-dates-using-law-enforcement-database/92474/Cybersecurityveralub/Shutterstock.comThousands of Weather Satellite Bugs Won’t Be Fixed For Yearshttp://www.nextgov.com/cybersecurity/2014/08/tens-thousands-weather-satellite-bugs-wont-be-fixed-years/92465/IG slams Raytheon and NOAA for failing to fix security holes on ground control system.Aliya SternsteinTue, 26 Aug 2014 17:10:43 -0400http://www.nextgov.com/cybersecurity/2014/08/tens-thousands-weather-satellite-bugs-wont-be-fixed-years/92465/CybersecurityThe Joint Polar Satellite SystemNOAAWill Obama's New Tech Squad Include Cyber Experts?http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/08/will-there-be-cyber-experts-obamas-new-dot-gov-brigade/92366/Digital Service team announcement didn’t mention privacy or security, while snoops continue targeting Internet users.Aliya SternsteinMon, 25 Aug 2014 17:27:36 -0400http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/08/will-there-be-cyber-experts-obamas-new-dot-gov-brigade/92366/Cybersecurity - Cybersecurity ReportErika Cross/Shutterstock.comHackers Taint the Caribbean, Smuggle Patient Data, and Bring Gaza to Delawarehttp://www.nextgov.com/cybersecurity/2014/08/hackers-taint-caribbean-smuggle-patient-data-and-bring-gaza-delaware/92246/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 22 Aug 2014 16:40:13 -0400http://www.nextgov.com/cybersecurity/2014/08/hackers-taint-caribbean-smuggle-patient-data-and-bring-gaza-delaware/92246/Cybersecuritydibrova/Shutterstock.comWill Court Move Clear the Way to Mass Government Hacking?http://www.nextgov.com/cybersecurity/2014/08/courts-move-ahead-permitting-mass-government-hacking/92228/A single warrant could authorize federal officials to inject malware into hundreds of suspects’ -- and victims’ -- computers.Aliya SternsteinFri, 22 Aug 2014 16:26:51 -0400http://www.nextgov.com/cybersecurity/2014/08/courts-move-ahead-permitting-mass-government-hacking/92228/CybersecurityFlickr user Matt Churchill Agencies Get New Guidelines for OK’ing Appshttp://www.nextgov.com/mobile/2014/08/new-agency-guidelines-apps/92108/The new guide is aimed at preventing staff from both oversharing and inadvertently welcoming in hackers.Aliya SternsteinThu, 21 Aug 2014 16:05:08 -0400http://www.nextgov.com/mobile/2014/08/new-agency-guidelines-apps/92108/MobileShutter_M/Shutterstock.comIs There Ebola on That Smartphone?http://www.nextgov.com/health/2014/08/there-ebola-smartphone/91961/Swabbing an iPad with alcohol could erase data as well as germs.Aliya SternsteinWed, 20 Aug 2014 16:52:43 -0400http://www.nextgov.com/health/2014/08/there-ebola-smartphone/91961/HealthA family sit near the body of their mother suspected of dying from the Ebola virus, as the father, right, tries to contact family members on his mobile phone, in Monrovia, Liberia.Abbas Dulleh/APDNA-Matching Androids to Help ID 600 MH17 Bodies and Remainshttp://www.nextgov.com/emerging-tech/2014/08/dna-matching-androids-help-id-600-mh17-bodies-and-remains/91826/Unknown whether there will be enough genetic evidence to name all 298 passengers.Aliya SternsteinTue, 19 Aug 2014 16:23:19 -0400http://www.nextgov.com/emerging-tech/2014/08/dna-matching-androids-help-id-600-mh17-bodies-and-remains/91826/Emerging TechUkrainian emergency workers carry a victim's body in a bag, at the crash site of Malaysia Airlines Flight 17 near the village of Hrabove, eastern UkraineEvgeniy Maloletka/AP