Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. View our editorial policy here.

1Hacking Dirty Dozen Fraudsters Favorite Attack Vectors

POS serverServersUsed in 36% of breaches

2No Title

POS terminalUser DevicesUsed in 21% of breaches

3No Title

Pay at the pump terminalUser Devices Used in 18% of breaches

4No Title

Database serverServersUsed in 14% of breaches

5No Title

Web app/serverServersUsed in 9% of breaches

6No Title

Regular employee/end-userPeople Used in 8% of breaches

7No Title

Automated teller machine (ATM)User DevicesUsed in 8% of breaches

8No Title

Desktop/workstationUser Devices Used in 8% of breaches

9No Title

Payment card (credit, debit, etc)Offline Data Used in 7% of breaches

10No Title

File servesServers Used in 4% of breaches

11No Title

DocumentsOffline Data Used in 4% of breaches

12No Title

Finance/accounting staffPeople Used in 4% of breaches

Subscribe for updates!

You must input a valid work email address.
You must agree to our terms.