CDML Computer Services - We make sure your BITS don't BYTE!       CALL: +1 718-393-5343
AI Without Guardrails: Venice.ai and the Growing Risk of Automated Cybercrime

AI Without Guardrails: Venice.ai and the Growing Risk of Automated Cybercrime

Click here to view/listen to our blogcast. As artificial intelligence becomes more powerful and widely available, new platforms are emerging.

🚨 Beware the Zoom Meeting Invite Scam

🚨 Beware the Zoom Meeting Invite Scam

Click here to view/listen to our blogcast. In the ever – evolving landscape of cybercrime, small and medium – sized.

Every Device a Beachhead: Chinese-Made Kill Switches and the Hidden Risks in Your Network

Every Device a Beachhead: Chinese-Made Kill Switches and the Hidden Risks in Your Network

Click here to view/listen to our blogcast. In recent weeks, U.S. regulators uncovered clandestine “kill switches” tucked inside Chinese-made solar-farm.

The False Security of Paying Ransom

The False Security of Paying Ransom

Click here to view/listen to our blogcast. Unfortunately, we now have another example that proves that there is no honor.

Cyberattacks Are Targeting the Food Industry

Cyberattacks Are Targeting the Food Industry

Click here to view/listen to our blogcast. Small food businesses are the heart of New York—whether it’s a local bakery.

Fake Podcast Invitation Scam: A New Threat Targeting Professionals

Fake Podcast Invitation Scam: A New Threat Targeting Professionals

Click here to view/listen to our blogcast. In today’s fast-paced digital world, professionals like CPAs, doctors, lawyers, IT professionals, engineers,.

From Your Office to the Capitol: How the ROUTERS Act Affects SMBs

From Your Office to the Capitol: How the ROUTERS Act Affects SMBs

Click here to view/listen to our blogcast. Last week, the U.S. House of Representatives gave bipartisan approval to the ROUTERS.

New Gmail Phishing Scam Exploits Google’s Own Tools

New Gmail Phishing Scam Exploits Google’s Own Tools

Click here to view/listen to our blogcast. In a disturbing new trend, cybercriminals have found a way to exploit trusted.

Unlocking Hidden Gems in Microsoft 365: Bookings & Whiteboard

Unlocking Hidden Gems in Microsoft 365: Bookings & Whiteboard

Click here to view/listen to our blogcast. Microsoft 365 is packed with powerful tools, but two often-overlooked features—Microsoft Bookings and.

Why Nation‑State Actors Are Turning Their Guns on SMBs

Why Nation‑State Actors Are Turning Their Guns on SMBs

Click here to view/listen to our blogcast. Small and midsize businesses (SMBs) have long assumed that only large enterprises or.