By
Todd Weller
Facebook
Facebook
Twitter
Twitter
LinkedIn
LinkedIn
Email
Email
0 Comments
Comments
2. Contain (or not contain). POS terminals have significant vulnerabilities that make it easy for hackers to target. Hackers have found ways to grab card data before it's encrypted into a POS system's memory. Whether it's foot traffic or website traffic, open ports — USBs, ethernets and tampering with POS devices — have all proven themselves as a security risk. Hackers can easily gain physical and virtual access to a network and move laterally to the targeted data.
0 Comments
View Comments
- Places:
- U.S.
Todd Weller
Author's page
Related Content
Comments