Slide 1Group members Andy, Sally, Maggie, Julie Slide 2 Outline I. Introduction A. Background B. Motivation II. Thesis A. Literature Review B. Method III. Discussion IV.…
Point of Sale (POS) Malware Easy to Spot, Hard to Stop Darian Lewis Sr. Threat Researcher Managed Security Services SYMANTEC 2 Introduction . . . . . . . . . . . . . . .…