Be the first to like this
http://bit.ly/1ia4WPi | In Q1 2014, DDoS attackers relied less upon traditional botnet infection in favor of reflection and amplification techniques. Instead of using a network of zombie computers, the newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. These techniques were responsible for a record-setting DDoS attack. Learn more about this DDoS threat in the full Q1 2014 DDoS attack report, available for a free download at http://bit.ly/1ia4WPi.