GNC underwriters exercise option to purchase additional shares
PITTSBURGH — GNC Holdings on Monday announced, in connection with its previously announced initial public offering, the underwriters have exercised in full their option to purchase from the selling stockholders an additional 3.375 million shares of Class A common stock.
GNC’s Class A common stock commenced trading on the New York Stock Exchange under the ticker symbol "GNC." The offering of 16 million shares by the company and 9.875 million shares by the selling stockholders — which includes the shares subject to the underwriters’ option — is expected to close on April 6.
Walgreens: Customer email database was breached
DEERFIELD, Ill. — Walgreens this weekend reported that its customer email database, which is hosted by a third-party vendor, was accessed without permission.
The drug store chain, which uses vendor Epsilon to deploy its email promotional messages, said that law enforcement authorities were notified and are investigating the matter. The company also emphasized that email addresses were the only information obtained in this incident.
Walgreens wasn’t the only retailer affected by the breach: Supermarket retailer Kroger also used Epsilon for its customer email communications. Other companies include JPMorgan Chase, Best Buy and TiVo.
Customers can contact Walgreens at 1-855-814-0010 with any questions regarding this matter.
Kroger discloses customer email breach
CINCINNATI — A database that held the names and email addresses of Kroger customers has been breached, the retailer announced.
The supermarket conglomerate said that the incident occurred at its third-party vendor, Epsilon, which manages Kroger’s customer email database and communications.
Kroger apologized to its customers and urged them not to open any messages from senders that they do not know, noting that Kroger would never ask for personal information (i.e., credit card or social security information) via email.
Customers can call 1-800-KROGERS or visit its "email frequently asked" Web page here.