Ever wondered about Amplification and Reflection attacks?

Blog Post created by B-3-HCB5WJ Employee on Jan 3, 2016

If you are curious in finding out more detail on how Amplification and Reflection work in the context of Distributed Denial of Service (DDoS) attacks, have look here:
Amplification is here to stay: Size Matters! - CSO | The Resource for Data Security Executives