What is the difference between Proof of Work (PoW) and Proof of Stake (PoS) in terms of security attacks?