SALES: (918) 707-2288

Blog

New Ransomware Strains Have Researchers On Their Toes

Recently, researchers have discovered two new ransomware strains, dubbed "AlumniLocker" and "Humble", both of which have very different ways of doing what they do. This highlights the ongoing development and diversification of ...

People Using Mobile Data Instead Of Internet Service Providers

The ongoing pandemic has impacted daily life in the United States in a number of ways, some predictable and others surprising. On the predictable side, when tens of thousands of employees were ...

Mobile App Vulnerabilities Found To Leave Data Unsecured

Most apps these days make use of cloud storage in order to minimize their footprint on your device. That's good in theory, but based on new research from Zimperium, a disappointing percentage ...

Microsoft Is Giving Windows 10 A New Makeover

One of the most frequently heard complaints about Windows has to do with aesthetics. Despite a few seemingly halfhearted attempts to modernize, significant portions of the OS looks and feels like they ...

Hackers Are Using Unpatched NAS Devices To Mine Bitcoin

In late 2020, QNAP discovered a pair of critical security vulnerabilities that would allow hackers to take remote control over network attached storage devices (NAS). In this particular instance, the hackers chose ...

Microsoft Expanding Fight Against Macros Based Malware

Macros have been a simple, effective means of spreading malware since the 1990's, and some hackers still rely on them heavily to ensnare and infect unsuspecting users. It's a long standing issue ...

Latest Apple Update Fixes Web Security Flaw On Most Devices

Recently, two different security researchers (Clement Lecigne of Google's Threat Analysis Group, and Alison Huffman from Microsoft's Browser Vulnerability Research Group) discovered a pair of serious security vulnerability impacting Apple devices. The ...

Hacker Uses Zoom Invites To Steal Credentials Through Sendgrid

There's a mix of bad news and good in the ongoing war against the hackers of the world. For the bad news, security professionals have recently detected a sophisticated phishing campaign that ...

New Exchange Online Feature Helps Prevent Phishing And Ransomware

Microsoft has been busy of late, making a raft of improvements to their email system that are designed to enhance user security. Not long ago, they added a fantastically useful feature called ...

Browser Wars Heat Up With Microsoft Edge Boosting Speeds

If you thought the browser wars were over, think again. Microsoft has made some startling improvements to its Edge browser recently that gave it an impressive 41 percent speed boost. That suddenly ...

Blog

Gamers Targeted By Hackers Through Code And Cheat Downloads

Gamers Targeted By Hackers Through Code And Cheat Downloads

Gamers tend to be surprisingly tech savvy, and as such, they're a bit harder to trick with social engineering than[...]
New Malware Appears To Be Android App For Free Netflix

New Malware Appears To Be Android App For Free Netflix

If you have an Android device and you're something of an app fanatic, you may have been tempted by an[...]
Details On Massive Facebook Data Leak Hack

Details On Massive Facebook Data Leak Hack

As you're probably aware, recently a vast trove of Facebook profiles totaling 533 million in all, wound up on a[...]

Locations

Broken Arrow (HQ)

1800 South Elm Place ,Suite 200
Broken Arrow, OK 74012
(918) 707-2288

Newsletter

Join our Newsletter to get the latest technology news and special offers.


Company

Since 2007, Integrated Business Technologies has been a leading provider of IT support and consulting, focusing on small and medium sized businesses in the Tulsa and Oklahoma City areas. We have helped hundreds of businesses increase productivity and profitability by making IT a streamlined part of operations. We equip our clients with customized technology solutions for greater operational value and to reduce risk.

Proud Member of

The 20 Elite