Whitepaper: Cyber Security Relating to Touch Technology
Touch screens are uniquely positioned to have direct access to sensitive information. For example, as users enter pin codes, IDs, user names and passwords, those touch locations are handled by [...]