Reflection attacks prey on vulnerabilities, but well-configured networks work to defeat attackers

This article first appeared in edition 9 of Behind the Dot magazine. Read the full article by downloading the magazine now. The quest for a safe and secure Internet is never-ending, as criminals seek new and ever more complex ways to breach Internet security. For most users, the behind-the-scenes attacks and efforts to prevent them [...]