This paper analyzes the events leading up to the second most devastating data breach in history: the attack on the Target Corporation. It breaks down the timeline, methodology and anatomy of BlackPOS – the malware used in the attack. In addition to a case analysis, this paper discusses the lack of consideration placed on safeguarding credit card information, and the need for improved transparency between large private sector entities and government agencies.

View Source