The anatomy of a POS malware attackHow do these attacks actually work? What do cybercriminals do to scrape data out of these systems?