SALES: (918) 707-2288

Blog

Some Popular Android Apps Found To Include Malware

Google does an admirable job of keeping its sprawling Play Store free of apps containing malware. Their verification system is world-class. That said, no system is perfect, and that includes Google's. In ...

This New Ransomware Can Infect A Network In Just Minutes

Not all ransomware strains are created equally. Some are designed as slow burns that will infect a target system, expanding its reach for days, or even weeks before striking and locking your ...

Mac And Android Added To GravityRAT Malware’s Targets

Malware comes in all shapes and sizes. Some strains copy and encrypt files. Others serve annoying ads. Still others work quietly in the background, mining this or that cryptocurrency using your computer's ...

Photoshop Testing Security For Images To Prevent Theft And Fakes

Deep Fakes are becoming an increasingly large problem. If you're not familiar with the term, a Deep Fake is an advanced photo or video technique in which an existing person in a ...

WordPress Loginizer Plugin Was Automatically Updated Due To Vulnerability

WordPress tends to take a light-handed approach when it comes to managing the legions of plugins that are compatible with the most popular blogging platform on the planet. This time, however, they're ...

Coordinated Effort Underway To Take Down Trickbot Malware

Score one for the good guys. A team led by Microsoft's DCU (Digital Crimes Unit) that includes Symantec, NTT Ltd, ESET, and Lumen's Black Lotus Labs is working on something new. They ...

Adobe Patches A Number of Critical Vulnerabilities In Latest Update

If you make frequent use of Adobe products, then you'll definitely want to give priority to applying the latest security update offered by the company. It's an out of band patch that ...

New Windows 10 Update Shows App Warnings For Malware

A great many malware strains are designed to engage quietly during a PC's startup process and then idle in the background. They are in the system logging keystrokes, taking screen shots at ...

Latest Windows 10 Update May Block Third Party Drivers

If you haven't yet installed the latest Windows 10 or Windows Server update, here's something to be aware of before you do. You may not be able to update or install some ...

Multi-Factor Authentication (MFA)

All Two-Factor Authentication (2FA) is Multi-Factor Authentication (MFA), but not all MFA is 2FA. Multi-Factor Authentication works on the principle of using multiple pieces of secret information in order to verify ...

Blog

New Microsoft Office Coming To Windows And Mac In 2021

New Microsoft Office Coming To Windows And Mac In 2021

Microsoft recently announced a significant addition to their ubiquitous office suite. Two new versions are on deck for 2021: A consumer Office[...]
Major Security Issues Found With Popular Android App

Major Security Issues Found With Popular Android App

Do you use the app "ShareIt?" It's one of the most popular apps in the ecosystem, boasting more than a billion[...]
Apple M1 Macs Are Not Immune To Malware

Apple M1 Macs Are Not Immune To Malware

Patrick Wardle is a legend in the Apple ecosystem, and one of the best independent security researchers out there. Not long[...]

Locations

Broken Arrow (HQ)

1800 South Elm Place ,Suite 200
Broken Arrow, OK 74012
(918) 707-2288

Company

Since 2007, Integrated Business Technologies has been a leading provider of IT support and consulting, focusing on small and medium sized businesses in the Tulsa and Oklahoma City areas. We have helped hundreds of businesses increase productivity and profitability by making IT a streamlined part of operations. We equip our clients with customized technology solutions for greater operational value and to reduce risk.

Proud Member of

The 20 Elite