Did you know unlocking your cell phone has been legalized?

Did You Know You Can Legally Unlock Your Cell Phone?

Did you know that when U.S. consumers purchase a new cellphone, they can legally change the network carrier the phone uses.  The bill known as The Unlocking Consumer Choice and Wireless Competition Act would repeal a Library of Congress (LOC) rulemaking determination, which went into effect August 1st of 2014, has been put into full

01 Oct 2015

How to Turn Off the Windows 10 Keylogger (And other Windows 10 privacy functions)

Turning Off the Keylogger Do you know? Microsoft has the power to track every single word you type or say to its digital assistant Cortana while using its newest operating system, Windows 10. The keylogger that was included in the Technical Preview last fall has been kept in the public release of Windows 10. However,

24 Sep 2015

Your Password Is Hack-able: (And How to Fix It with Two-Factor Authentication)

How many online accounts do you have? Bank accounts, social media accounts, email accounts etc. We all use websites and mobile applications to manage money, store our information, connect with our friends, and make purchases from anywhere in the world. How many different passwords do you use and how secure are those passwords? According to

11 Sep 2015
Google ups the ante with Chrome OS

Google Ups the Ante With Chrome OS

In response to the roll out of Windows 10 on many of Microsoft’s netbooks, Google has upped the ante on their own offering of netbooks (called Chromebooks). In order to compete with the sleek new interface and usability of Windows 10 Google is releasing a new and improved Chrome OS. Google embraced the concept of

20 Aug 2015
smartwatches are hackable

Smartwatches Are Hackable

Gartner, Inc. forecasts that 4.9 billion connected things will be in use in 2015, up 30 percent from 2014, and will reach 25 billion by 2020. A good portion of that number will be wearable devices; specifically smartwatches. Smartwatches have been gaining popularity in the last year as a convenient wearable device that connects the

30 Jul 2015
CYOD is the new BYOD


According to a new study by CompTIA, bring-your-own-device (BYOD) is a trend on the downturn. The survey conducted in April and May of 375 U.S. IT professionals in various private businesses found that 53% allowed no BYOD, up significantly from 34% in 2013. The BYOD findings were published recently in a comprehensive CompTIA report, “Building Digital

16 Jul 2015
electronic frontier foundation 2015 privacy report

The EFF 2015 Government Privacy Report

The EFF released its latest Who Has Your Back report based on 5 basic criteria that included: Follows Industry Accepted Best Practices Tells Users About Government Data Demands Discloses Policies on Data Retention Discloses Government Content Removal Requests Pro-user Public Policy: opposes backdoors We’ve combed through the report and created an easy-to-read e-book featuring the

02 Jul 2015
Google and Gmail officially roll out Undo Send email function

Google Officially Rolls Out the Ability to Undo Sent Emails

Everyone has experienced moments when they wish they could undo a sent email. Those moments where an email was sent to the wrong recipient, contained misspelled a word or name, or accidentally said something they wished they hadn’t. Starting this week, Gmail account holders will have the option to cancel the delivery of an email

25 Jun 2015
How to encrypt your USB flash drive using TrueCrypt software

How To Encrypt Your USB Flash Drive Using TrueCrypt

USB flash drives are great for transporting files and documents. On the other hand, the small size and ease of mobility also has disadvantages. Thumb drives are incredibly easy to forget in the USB port and they’re small enough to fall out of—or be taken from—your pocket or bag unnoticed. Because theft or human error

18 Jun 2015
Tips to Avoid Malicious Phone Apps

Tips to Avoid Malicious Phone Apps

The smart phone has become the go-to device for talking, texting, web browsing, picture taking, and even banking. Millions of phone applications (Apps) are downloaded daily to enhance the individual experience and cater to the users many needs. However, just as viruses invade computers, phones are also a prime target for malicious programs that are

11 Jun 2015
ManageWatch Blog by teslathemes