The technology is vulnerable to exploit in launching a breed of DDoS attack which reflects and amplifies traffic.from Latest topics for ZDNet in Security http://ift.tt/1DXpyFt