CDML Computer Services - We make sure your BITS don't BYTE!       CALL: +1 718-393-5343
FrigidStealer Infostealer Uses Fake Browser Updates to Infect Macs

FrigidStealer Infostealer Uses Fake Browser Updates to Infect Macs

Click here to view/listen to our blogcast. Cybersecurity threats are constantly evolving, and even Mac users, long considered less vulnerable.

Ingenious Quishing: How Fake QR Codes Compromise Cybersecurity

Ingenious Quishing: How Fake QR Codes Compromise Cybersecurity

Click here to view/listen to our blogcast. Cyber threats are evolving, and even the most secure systems can be compromised.

The Dangers of Sharing Email and Cloud Accounts

The Dangers of Sharing Email and Cloud Accounts

Watch or listen to our Blogcast HERE. In small and medium-sized businesses, it’s common to share email and cloud accounts.

The Pervasive Threat of Phishing in Social Media and on Mobile Devices

The Pervasive Threat of Phishing in Social Media and on Mobile Devices

View/listen to our blogcast here. In today’s interconnected digital landscape, phishing has become an ever-present danger, infiltrating our social media.

US Government’s Response to Foreign Cyber Threats

US Government’s Response to Foreign Cyber Threats

View/listen to our blogcast here. In our increasingly interconnected digital world, the threat of cyberattacks from foreign actors continues to.

AI Under Attack: Microsoft & OWASP Highlight Emerging AI Security Threats

AI Under Attack: Microsoft & OWASP Highlight Emerging AI Security Threats

View/listen to our blogcast here. Artificial Intelligence (AI) is rapidly transforming the business landscape, offering unprecedented efficiencies and innovations. However,.

Lessons From a Long Haul: Ransomware Attack on a Richmond University Medical Center in NY

Lessons From a Long Haul: Ransomware Attack on a Richmond University Medical Center in NY

In 2023, a well-known New York hospital fell victim to a significant ransomware attack, ultimately affecting the personal data of.

Navigating Compliance for Medical Providers in New York Part 1 of 2

Navigating Compliance for Medical Providers in New York Part 1 of 2

A Guide to HIPAA, NY SHIELD Act, and PCI Regulations Medical providers in New York face a complex web of.

New Scam Tactics: The Dangers of Fake Support Scams, Unfiltered Emails, and Unauthorized Remote Access

New Scam Tactics: The Dangers of Fake Support Scams, Unfiltered Emails, and Unauthorized Remote Access

Cybercriminals are constantly devising new and sophisticated methods to exploit unsuspecting victims. Among these threats, fake tech support scams, unfiltered.

New Report Shows Unsafe Employee Behaviors Put Organizations at Risk

New Report Shows Unsafe Employee Behaviors Put Organizations at Risk

Cybersecurity has become a critical concern for organizations of all sizes. Recent findings from a CyberArk study reveal troubling trends.