This post was last updated on August 8th, 2019 at 10:55 am

Download the Security Brief

Submit the form below to download this Security Brief outlining how to protect retail customers from POS cyber attacks.
  • Hidden
  • Hidden
  • Hidden
  • This field is for validation purposes and should be left unchanged.


POS systems are constantly attacks by hackers using malware such as LockPos/FlokiBot, MajikPOS, and JackPOS to name a few. The reason is no mystery – POS systems are a key part of a retailer’s transaction process. They provide an access point through which cybercriminals can access and steal customers’ payment information, making them attractive targets for malicious hackers.

Security Brief

POS systems that support retail operations have been shown to be a weak spot in cybersecurity. A series of high profile hacks in 2017 exposed customers’ personally identifiable information (PII) and payment card details. Recent malware created for POS cyber attacks include UDPoS and PoSeidon, which have been identified by researchers as an evolved variant that was professionally designed to be quick and evasive with new capabilities such as communication with command-and-control servers, self-updating to execute new code and self-protection to guard against reverse engineering.

security brief retail pos cyber attacks