CDML Computer Services - We make sure your BITS don't BYTE!       CALL: +1 718-393-5343
The Dangers of ClickFix Scams

The Dangers of ClickFix Scams

Click here to view/listen to our blogcast. ClickFix scams have emerged as one of the most insidious social‑engineering threats of.

Don’t Be a Victim of Social Engineering Scams!

Don’t Be a Victim of Social Engineering Scams!

Click here to view/listen to our blogcast. In today’s rapidly evolving digital landscape, one of the most deceptive and dangerous.

Protect Your Data from Malicious Document Converters

Protect Your Data from Malicious Document Converters

Click here to view/listen to our blogcast. Beware of Free Offers on the Internet! In today’s digital landscape, it pays.

FrigidStealer Infostealer Uses Fake Browser Updates to Infect Macs

FrigidStealer Infostealer Uses Fake Browser Updates to Infect Macs

Click here to view/listen to our blogcast. Cybersecurity threats are constantly evolving, and even Mac users, long considered less vulnerable.

Ingenious Quishing: How Fake QR Codes Compromise Cybersecurity

Ingenious Quishing: How Fake QR Codes Compromise Cybersecurity

Click here to view/listen to our blogcast. Cyber threats are evolving, and even the most secure systems can be compromised.

The Pervasive Threat of Phishing in Social Media and on Mobile Devices

The Pervasive Threat of Phishing in Social Media and on Mobile Devices

View/listen to our blogcast here. In today’s interconnected digital landscape, phishing has become an ever-present danger, infiltrating our social media.

Lessons From a Long Haul: Ransomware Attack on a Richmond University Medical Center in NY

Lessons From a Long Haul: Ransomware Attack on a Richmond University Medical Center in NY

In 2023, a well-known New York hospital fell victim to a significant ransomware attack, ultimately affecting the personal data of.

New Scam Tactics: The Dangers of Fake Support Scams, Unfiltered Emails, and Unauthorized Remote Access

New Scam Tactics: The Dangers of Fake Support Scams, Unfiltered Emails, and Unauthorized Remote Access

Cybercriminals are constantly devising new and sophisticated methods to exploit unsuspecting victims. Among these threats, fake tech support scams, unfiltered.

FBI and CISA Warning: Use Only Encrypted Messaging

FBI and CISA Warning: Use Only Encrypted Messaging

As a small business owner, your focus is often on growing your company, managing clients, and supporting employees. But recent.

Novel Phishing Attack Uses Corrupted Word Documents to Bypass Security Filters

Novel Phishing Attack Uses Corrupted Word Documents to Bypass Security Filters

Cybercriminals have developed a sophisticated phishing campaign using corrupted Microsoft Word documents to bypass traditional security measures. This novel attack,.