{"id":11253,"date":"2016-01-29T16:00:31","date_gmt":"2016-01-29T22:00:31","guid":{"rendered":"http:\/\/hcstx.org\/?p=11253"},"modified":"2016-01-29T16:00:31","modified_gmt":"2016-01-29T22:00:31","slug":"cyber-security-alert-wendys-burger-joints-hacked","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2016\/01\/29\/cyber-security-alert-wendys-burger-joints-hacked\/","title":{"rendered":"Cyber-Security Alert: Wendy&#8217;s Burger Joints Hacked"},"content":{"rendered":"<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-11254\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2016\/01\/wemdy.jpg\" alt=\"wemdy\" width=\"139\" height=\"123\" \/><\/p>\n<p>As we continue to make advancements in this technological age, vulnerabilities in our cybersecurity have become glaringly obvious.<\/p>\n<p>Over the past few years there have been numerous embarrassing and potentially dangerous hacks of high-profile <a href=\"http:\/\/conservativetribune.com\/romney-tweet-sony-hacker\/\" target=\"_blank\" rel=\"noopener\">private businesses<\/a> and <a href=\"http:\/\/conservativetribune.com\/alert-feds-announce-hackers\/\" target=\"_blank\" rel=\"noopener\">government agencies<\/a>, exposing the identities and financial assets of millions of American citizens to fraud and theft.<\/p>\n<p>Now the <a href=\"http:\/\/conservativetribune.com\/wendys-banned-common-food-1\/\" target=\"_blank\" rel=\"noopener\">fast food chain Wendy\u2019s<\/a> can be added to the list of those who have been hacked, according to the<a href=\"http:\/\/www.dailymail.co.uk\/news\/article-3419336\/Wendys-investigating-unusual-activity-payment-cards.html\" target=\"_blank\" rel=\"noopener\">U.K.\u2019s Daily Mail<\/a>.<\/p>\n<p>They are reporting that Wendy\u2019s is investigating \u201cunusual activity\u201d that has taken place on credit cards used at their restaurants recently.<\/p>\n<p>The fast food chain was alerted to the activity by banking industry sources and cybersecurity experts, as reported by <a href=\"http:\/\/krebsonsecurity.com\/2016\/01\/wendys-probes-reports-of-credit-card-breach\/#more-33694\" target=\"_blank\" rel=\"noopener\">Krebs on Security<\/a>.<\/p>\n<p class=\"mol-para-with-font\">Wendy\u2019s is now working closely with those cybersecurity experts and law enforcement officials to determine exactly what happened and who is responsible.<\/p>\n<p class=\"mol-para-with-font\">Read the Remainder at <strong><a href=\"http:\/\/conservativetribune.com\/wendys-check-bank-account\/?utm_source=Email&amp;utm_medium=MailChimp&amp;utm_content=featured-stories&amp;utm_campaign=DailyEmail01.29.16&amp;utm_medium=email&amp;utm_campaign=Conservative%20Tribune%20-%20Daily%20Newsletter%201292016&amp;utm_content=Conservative%20Tribune%20-%20Daily%20Newsletter%201292016+CID_eb98ae3427c2817d46dc87cfe19080bc&amp;utm_source=CampaignMonitor&amp;utm_term=If%20Youve%20Eaten%20At%20A%20Wendys%20Recently%20Check%20Your%20Bank%20Account%20NOW\">Conservative Tribune<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we continue to make advancements in this technological age, vulnerabilities in our cybersecurity have become glaringly obvious. Over the past few years there have been numerous embarrassing and potentially dangerous hacks of high-profile private businesses and government agencies, exposing the identities and financial assets of millions of American citizens to fraud and theft. Now&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[13,74,1317],"tags":[4177,4178,4179,4180,4181,4182],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/11253"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=11253"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/11253\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=11253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=11253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=11253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}