Worth Reading: DECT cryptanalysis and counter attacks on malware
* Cryptanalysis of the DECT Standard CipherPDF, a paper by Karsten Nohl, Erik Tews and Ralf-Philipp Weinmann.
Reverse engineer Andrzej Dereszowski closely analysed the malware installed via a PDF document on a customer's system, searching for specific security holes. He found that the freely available Poison Ivy "remote administration tool" had been installed to access infected systems.
The link for this article located at H Security is no longer available.