The anatomy of a POS malware attack
How do these attacks actually work? What do cybercriminals do to scrape data out of these systems?
A three-pronged approach to data security at the Point of Sale
EMV is a great start, but point to point encryption and tokenization should also be utilized to protect in-transit card data.