CDML Computer Services - We make sure your BITS don't BYTE!       CALL: +1 718-393-5343
🚨 Beware the Zoom Meeting Invite Scam

🚨 Beware the Zoom Meeting Invite Scam

Click here to view/listen to our blogcast. In the ever – evolving landscape of cybercrime, small and medium – sized.

The False Security of Paying Ransom

The False Security of Paying Ransom

Click here to view/listen to our blogcast. Unfortunately, we now have another example that proves that there is no honor.

Fake Podcast Invitation Scam: A New Threat Targeting Professionals

Fake Podcast Invitation Scam: A New Threat Targeting Professionals

Click here to view/listen to our blogcast. In today’s fast-paced digital world, professionals like CPAs, doctors, lawyers, IT professionals, engineers,.

New Gmail Phishing Scam Exploits Google’s Own Tools

New Gmail Phishing Scam Exploits Google’s Own Tools

Click here to view/listen to our blogcast. In a disturbing new trend, cybercriminals have found a way to exploit trusted.

Why Nation‑State Actors Are Turning Their Guns on SMBs

Why Nation‑State Actors Are Turning Their Guns on SMBs

Click here to view/listen to our blogcast. Small and midsize businesses (SMBs) have long assumed that only large enterprises or.

The Dangers of ClickFix Scams

The Dangers of ClickFix Scams

Click here to view/listen to our blogcast. ClickFix scams have emerged as one of the most insidious social‑engineering threats of.

Don’t Be a Victim of Social Engineering Scams!

Don’t Be a Victim of Social Engineering Scams!

Click here to view/listen to our blogcast. In today’s rapidly evolving digital landscape, one of the most deceptive and dangerous.

Protect Your Data from Malicious Document Converters

Protect Your Data from Malicious Document Converters

Click here to view/listen to our blogcast. Beware of Free Offers on the Internet! In today’s digital landscape, it pays.

FrigidStealer Infostealer Uses Fake Browser Updates to Infect Macs

FrigidStealer Infostealer Uses Fake Browser Updates to Infect Macs

Click here to view/listen to our blogcast. Cybersecurity threats are constantly evolving, and even Mac users, long considered less vulnerable.

Ingenious Quishing: How Fake QR Codes Compromise Cybersecurity

Ingenious Quishing: How Fake QR Codes Compromise Cybersecurity

Click here to view/listen to our blogcast. Cyber threats are evolving, and even the most secure systems can be compromised.