CDML Computer Services - We make sure your BITS don't BYTE!       CALL: +1 718-393-5343
The Pervasive Threat of Phishing in Social Media and on Mobile Devices

The Pervasive Threat of Phishing in Social Media and on Mobile Devices

View/listen to our blogcast here. In today’s interconnected digital landscape, phishing has become an ever-present danger, infiltrating our social media.

Novel Phishing Attack Uses Corrupted Word Documents to Bypass Security Filters

Novel Phishing Attack Uses Corrupted Word Documents to Bypass Security Filters

Cybercriminals have developed a sophisticated phishing campaign using corrupted Microsoft Word documents to bypass traditional security measures. This novel attack,.

New DocuSign Phishing Scams: What You Need to Know

New DocuSign Phishing Scams: What You Need to Know

A new and sophisticated cybersecurity threat has emerged, targeting businesses and individuals through seemingly legitimate DocuSign emails. This blog post.

Google Chrome’s Phishing Warning Feature: A Double-Edged Sword

Google Chrome’s Phishing Warning Feature: A Double-Edged Sword

In the constant battle between cybersecurity professionals and cybercriminals, even protective measures can be exploited. A new campaign, known as.

The Next Generation of Quishing: Evolving QR Code Phishing Tactics to Watch Out For

The Next Generation of Quishing: Evolving QR Code Phishing Tactics to Watch Out For

In a recent post, we discussed how cybercriminals use QR codes for phishing attacks, known as quishing. Now, Barracuda researchers.

Think Before You Scan: How Cybercriminals Use QR Codes to Steal Your Data

Think Before You Scan: How Cybercriminals Use QR Codes to Steal Your Data

In today’s fast-paced digital world, QR codes have become a convenient way to access information, websites, and services. From restaurant.

The Danger of Opening Email Attachments

The Danger of Opening Email Attachments

In today’s digital age, email remains a primary communication tool for businesses worldwide. However, email comes with significant security risks, particularly.

Beware of Phishing Attacks Targeting Microsoft OneDrive Users

Beware of Phishing Attacks Targeting Microsoft OneDrive Users

In today’s digital landscape, cybersecurity threats are ever-evolving, and one of the latest targets is Microsoft OneDrive users. A sophisticated.

The Anatomy of a Hack: Understanding Phishing Attacks

The Anatomy of a Hack: Understanding Phishing Attacks

The Compromise Begins: Phishing and Social Engineering The initial stage of most cyberattacks involves acquiring a user’s credentials through deceptive.

User Training, Email Security, and System Monitoring

User Training, Email Security, and System Monitoring

In today’s digital world, businesses face an increasing number of cyber threats. At CDML Computer Services, we emphasize the critical.