Researchers demonstrated how they can capture both Track 2 data and bypass chip and pin protections with a Raspberry Pi and infected pin pads at Black Hat.
Source: Threadpost