In this presentation, we will describe ways an attacker may use to get access to Point of Sale (POS) or Point of Purchase (POP) systems. We will demonstrate some critical SAP vulnerabilities and discuss the security level of modern POS systems. After the presentation, you won’t be able to swipe your credit card at stores as carelessly as you used to. The presentation will use practical examples of a fully-explained attack vector, starting at beginning of an attack and ending with accessing critical data.”]
Source: https://gsec.hitb.org/sg2017/sessions/get-to-the-money-hacking-pos-and-pop-systems/

