Christian Cawley

Joined December 2011

Christian Cawley is MakeUseOf's security editor, Android tinkerer, Windows Phone mentalist, and Doctor Who fan. Follow him as @thegadgetmonkey on Twitter.

Security Editor

Feel free to contact at ccawley@makeuseof.com

576 Posts Published
1167 Comments Posted
10 Answers

Christian's Latest Posts

camera-360

5 Cool Android Camera Tricks with Camera360 Ultimate

30th April, 2015

This app allows for some awesome photos on your Android smartphone or tablet — here are its 5 best features!

record-screen-android

What’s the Best Way to Record Your Screen on Android?

27th April, 2015

Need to record the screen on your Android phone or tablet? Here is exactly how to get it done.

paul-dead-conspiracy

Paul is Dead: How the Internet Fueled The Beatles Conspiracy Theory

24th April, 2015

Did Paul McCartney, legendary musician and member of The Beatles, actually die in 1966 only to be replaced by a lookalike? Probably not, but the “Paul is Dead” conspiracy theory simply refuses to die.

muo-security-5tips-featured

5 Vital Computer Security Tips You Need To Learn Today

23rd April, 2015

It isn’t enough to just want to be secure; you have to actively ensure your digital security, day in, day out. These five tips will help.

muo-diy-review-kano-ft

Kano: The DIY Computer For Kids To Code and Learn (Review and Competition)

22nd April, 2015

Can a small child build a computer and learn to code on it? To find out, I tested it on one 3 year old boy with little experience of computers, and his 9 year cousin, a girl with a close relationship with her Nintendo Wii.

itunes-android

How to Sync iTunes Music with an Android Phone or Tablet

21st April, 2015

Using iTunes but have an Android device? You’ll want this simple method of syncing your music to your Android phone or tablet.

chromecast-root

How to Root Your Chromecast

18th April, 2015

Want region blocked content streamed through your Chromecast? By rooting the Chromecast, you unlock the ability to change your DNS (among other things). Here’s how!

muo-security-5tips-data-ft

Five Ways To Ensure Your Personal Data Remains Secure

17th April, 2015

Your data is you. Whether it is a collection of photographs you took, images you developed, reports you wrote, stories you thought up or music you collected or composed, it tells a story. Protect it.

windows-vulnerability

Every Version of Windows Is Affected By This Vulnerability – What You Can Do About It.

16th April, 2015

What would you say if we told you that your version of Windows is affected by a vulnerability that dates back to 1997? Unfortunately, this is true. Microsoft simply never patched it. Your turn!

ipad-upgrade

5 Signs It’s Time to Upgrade Your iPad

16th April, 2015

The streamlined design no longer impresses you, and as for the lack of app choice… has your iPad been left behind?

muo-wp81-upgrade-ft

Want a Windows 10 Smartphone? How to Upgrade & Compatible Models

15th April, 2015

Windows 10 is coming to your desktop, tablet, and now to your phone. If you have a suitable Windows Phone 8.1 and a Microsoft account, the upgrade is easy to get. We show you what to expect.

fix-windows-wireless

How to Fix Your Wireless Internet Connection in Windows

8th April, 2015

Are you struggling to get a strong and stable wireless Internet connection? It could be the hardware or Windows itself causing the problem. Here are some troubleshooting tips.

muo-security-nsahacks-ft

How Do You Know If Your New PC Is Secure?

7th April, 2015

Recent stories teach us that, in almost every case, there is software pre-installed on your device designed to intercept online transactions, listen in, or compromise your security in some other way.

remove-android-bloatware

How to Remove Bloatware on Android Without Rooting

6th April, 2015

Did your phone come with a bunch of crappy apps pre-installed? Let us show you how to get rid of them the easy way.

slack-breach

Slack & Hack: What You Need To Know About Collaboration Tool Security Breach

4th April, 2015

Popular communications app Slack was breached; passwords are considered safe, but users are encouraged to take steps.