You searched for Wendys/ | Page 2 of 5 | SC Media

Your search for Wendys/ returned 45 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Your search for Wendys/ returned 45 results

Sort Results:

Relevant Recent
2014 Women in IT Security
Features

2014 Women in IT Security: Wendy Nather

In 2010 Wendy Nather joined 451 Research as a senior analyst, and she now serves as research director for the information security practice covering many different areas, with a heavy focus on application security, security services and threat intelligence.
Security News

Realtors hack competitor email

Three real estate agents in Rockingham, N.C. were charged with illegally accessing a Hotmail account belonging to the employee of a competitor. RE/MAX Tri City Realty agents Wendy Robson Massagee, 43; Kim Dawn Whitley, 40; and Jamie Moss-Godfrey, 41, allegedly used the victim's username and password to access the account and view work-related emails, according to a report in the Richmond County (N.C.) Daily Journal. All three were released and are scheduled to appear in local court on April 23. - AM
2 Minutes On

Analyzing, Identifying & Defining Data: The Next Steps in Security

Your organization's unstructured information is comprised of emails, documents, and other file types, and is saved to computers, mobile devices, the cloud, everywhere. So how do you go about securing your most important data, optimizing information sharing, and reducing data loss if you don't know what data you have and where it is?
POS systems point of sale
Cybercrime

167 Applebee’s locations across 15 states hit with POS breach

RMH Franchise Holdings, which claims to be the second largest Applebee’s franchisee, is warning Applebee’s customers that point-of-sale malware affected 167 restaurants in 15 states. Franchises in Alabama, Arizona, Florida, Illinois, Indiana, Kansas, Kentucky, Missouri, Mississippi, Nebraska, Ohio, Oklahoma, Pennsylvania, Texas, and Wyoming were affected in the breach. The company discovered the malware on Feb.…
InfoSec Insider

Mission Really Difficult: Securing Your Supply Chain

How do you secure that which you don't control? This is the big question for every enterprise, since no organization exists in a vacuum. From third-party commercial software (including operating systems) to open source, custom-written applications, there are plenty of attack vectors that cause concern.

Cybercrime, Finance, Legal, Malware, Security News

Fin7 operator pleads guilty to two counts

Ukrainian Fedir Hladyr, a FIN7 operator, pleaded guilty in a U.S. district court Wednesday to conspiracy to commit computer hacking and wire fraud. The 34-year-old Hladyr, who has been in custody since his January 2018 arrest in Dresden, Germany for serving as an administrator of the hacking group under the cover of front company called…
Data Breach

Sonic Drive-In latest to be hit in POS data breach

Sonic Drive-In is investigating a possible point-of-sale (POS) breach that has led to customer payment card information being sold on a dark web market. Information on the cyberattack is limited so far, with no firm data on the number of cards affected, store locations involved, or how the POS system was infiltrated and with what…
Next post in Data Breach