Nearly half of U.S. credit-card holders are reluctant to shop at stores such as Target and Home Depot that have been hacked, according to a survey by Forty-five percent of respondents say they will definitely or probably avoid one of their regular stores over the holidays if that retailer has suffered a data breach.

Sixteen percent say they definitely wouldn’t return to a store that had been hacked, and 29 percent say they probably wouldn’t shop at stores that had been hacked.

The survey was conducted earlier this month by phone. On behalf of, Princeton Survey Research Associates International surveyed 865 American adults who have debit or credit cards.

Major data breaches at U.S. retailers — most recently Kmart, AT&T and Dairy Queen — may have exposed millions of Americans’ credit-card information.

Fortunately for retailers, high-income households earning more than $75,000 per year are the least likely to avoid affected stores. Only 31 percent say they would avoid a store that had been hacked, compared to 56 percent of households with annual incomes below $30,000. And women are more likely than men to continue shopping at a store that has been hacked, the survey found.

Only 1 in 8 say they are more likely to shop with a credit card this holiday season, and 48 percent say they plan to pay with cash more frequently in response to the data breaches.

“It may sound weird, but the truth is that credit cards offer far greater consumer protections than debit cards, cash or other payment methods,” Matt Schulz,’s senior industry analyst, said in a statement. 


When 17-year-old George Hotz became the world’s first hacker to crack AT&T’s lock on the iPhone in 2007, the companies officially ignored him while scrambling to fix the bugs his work exposed. When he later reverse engineered the Playstation 3, Sony sued him and settled only after he agreed to never hack another Sony product.

When Hotz dismantled the defenses of Google’s Chrome operating system earlier this year, by contrast, the company paid him a $150,000 reward for helping fix the flaws he’d uncovered. Two months later Chris Evans, a Google security engineer, followed up by email with an offer: How would Hotz like to join an elite team of full-time hackers paid to hunt security vulnerabilities in every popular piece of software that touches the internet?

Today Google plans to publicly reveal that team, known as Project Zero, a group of top Google security researchers with the sole mission of tracking down and neutering the most insidious security flaws in the world’s software. Those secret hackable bugs, known in the security industry as “zero-day” vulnerabilities, are exploited by criminals, state-sponsored hackers and intelligence agencies in their spying operations. By tasking its researchers to drag them into the light, Google hopes to get those spy-friendly flaws fixed. And Project Zero’s hackers won’t be exposing bugs only in Google’s products. They’ll be given free rein to attack any software whose zero-days can be dug up and demonstrated with the aim of pressuring other companies to better protect Google’s users.

MORE: Meet ‘Project Zero,’ Google’s Secret Team of Bug-Hunting Hackers

The attack at JPMorgan Chase affected the data of 76 million households and 7 million businesses, the bank said in a regulatory filing on Thursday.

That impact was far bigger than earlier estimates that about 1 million customers had been affected, the New York Times noted. It represents more than half of the roughly 115 million households in America.

Hackers attacked the bank’s computer systems periodically between mid-June and mid-August, according to The Wall Street Journal. The attackers accessed customer names, email addresses, phone numbers and physical addresses, along with “internal JPMorgan Chase information relating to such users,” the bank said in its regulatory filing. The bank didn’t describe what sort of information that was.


So JP Morgan, Target, Home Depot etc



If a hacker can obtain a user’s iCloud username and password with iBrute, he or she can log in to the victim’s account to steal photos. But if attackers instead impersonate the user’s device with Elcomsoft’s tool, the desktop application allows them to download the entire iPhone or iPad backup as a single folder, says Jonathan Zdziarski, a forensics consult and security researcher. That gives the intruders access to far more data, he says, including videos, application data, contacts, and text messages.

MOREThe Police Tool That Pervs Use to Steal Nude Pics From Apple’s iCloud

Hackers steal personal data for 25,000 Homeland Security employees


Doesn’t feel so nice when it happens to you, does it?  

from Breitbart:

USIS, the Department of Homeland Security’s contractor for conducting security clearance background checks, has had the personal records of at least 25,000 of its employees stolen because of hackers, and the hackers may have been from a foreign country, according to the Associated Press (AP).

AP’s source was an unnamed DHS official who told AP that Homeland Security would soon let employees know if their personal information had been stolen and encourage them to check their financial accounts.

USIS provides the most background investigations to the federal government of any company, but the company is being targeted with a federal whistleblower lawsuit because it allegedly “dumped” over 600,000 background checks for security clearances, allowing some clearances to be considered complete although they were not completely conducted.

read the rest

When hackers steal data from Homeland Security, it’s considered a crime.  When the government steals data from private citizens, it’s called “Homeland Security.”