
Photo by Clastr Cloud Gaming
Eye strain and weariness are now typical concerns since so much of our work, education, and leisure is done in front of digital screens. Since they provide a means of blocking off the high-energy blue light that screens emit, blue light glasses have grown in popularity as a possible treatment. However, are they effective? Are they also worth the money? In order to assist you determine whether blue light glasses are a practical addition or merely a fad, we’ll dissect the science underlying blue light, how they operate, and who might benefit from wearing them.

Signs that your PC may have been hacked
System instability, financial loss, and stolen personal information are all possible outcomes of a compromised computer. Hackers frequently use malware, phishing scams, or security flaws to get into systems. It is essential to identify a compromised system’s early warning indicators to take action before more harm is done.
– Unusual system behavior
Your computer may have malware or unauthorized remote access if it abruptly slows down, freezes, or reboots. Typical signs and symptoms include:
- Programs opening far more slowly
- Blue screens or frequent system breakdowns
- Unexpected reboots or shutdowns
Potential reasons:
- Malware using up system resources
- A hacker remotely taking over your computer
- System files corrupted by a cyberattack
– Unexplained high CPU or network usage
If your CPU usage or internet activity spikes, even when you’re not running resource-intensive applications, it could mean a hidden process is running in the background.
How to check for unusual CPU & network activity:
- Open Task Manager (Ctrl + Shift + Esc).
- Go to the Processes tab and sort by CPU or Network usage.
- Look for unfamiliar or high-resource processes.
- If suspicious, right-click and select End Task.
Possible causes:
- Cryptojacking malware mining cryptocurrency
- A hacker is using your PC to launch attacks
- Botnet infections consume bandwidth
– New or unknown programs installed on Your PC
If you notice suspicious apps or programs installed without your knowledge, it could be malware.
How to check for unwanted programs:
- Open Control Panel → Programs & Features.
- Look for recently installed or unknown software.
- If suspicious, uninstall it immediately.
Possible causes:
- Malware downloaded from unsafe websites
- Hidden software bundled with other programs
- A hacker installed a backdoor or spyware
– Strange pop-ups, redirects, or ads appear randomly
Frequent pop-ups, browser redirects, or intrusive ads could mean your PC has adware or a browser hijacker.
Signs of adware infection:
- You get pop-ups even when your browser is closed.
- Your searches redirect to unknown websites.
- Unwanted browser toolbars appear.
Possible causes:
- Malicious browser extensions
- Infected software downloads
- Visiting compromised websites
– Disabled Antivirus or Windows Security Features
Hackers often disable security programs to prevent detection. If your antivirus turns off unexpectedly, it’s a red flag.
How to check security settings:
- Open Windows Security (Win + I → Update & Security → Windows Security).
- Ensure Real-time Protection and Firewall are enabled.
- If they are disabled and you can’t turn them on, you may be infected.
Possible causes:
- Rootkits or advanced malware disabling protection
- Unauthorized remote control of your system
- A hacker exploiting system vulnerabilities
– Unauthorized access to accounts or emails sent without your knowledge
If you notice emails, messages, or logins from locations you don’t recognize, a hacker may have gained access to your credentials.
How to check for unauthorized access:
- Review the email sent folder for messages you didn’t write.
- Check account activity logs (Google, Microsoft, Facebook, etc.).
- If suspicious, change your password immediately.
Possible causes:
- Phishing attacks
- Data breaches exposing your credentials
- A keylogger capturing your login details
– Files missing, corrupt, or locked with ransom messages
If files disappear, become corrupted, or are locked with a ransom note, your PC may have ransomware.
Signs of ransomware infection:
- Files have strange extensions (.locked, .encrypted, .crypt).
- A ransom message appears demanding payment.
- You can’t access personal documents or images.
Possible causes:
Visiting compromised websites
Clicking on infected email attachments
Downloading software from untrusted sources

How to confirm if your PC has been hacked
If you suspect that your PC may have been hacked, it’s important to act quickly. Hackers can steal sensitive information, install malware, or use your computer for malicious purposes. Here’s how to confirm if your PC has been compromised.
– Check running processes for suspicious activity
Your computer’s Task Manager can provide valuable information about what’s running on your system.
- Why it works: Suspicious processes may indicate that malware or unauthorized software is running in the background, consuming CPU resources or performing harmful activities.
- How to do it: Press Ctrl + Shift + Esc to open Task Manager. Look for processes that you don’t recognize, especially those using high CPU or memory. If you find anything suspicious, right-click on the process and select Open file location to check its origin. You can also search the process name online to see if it’s associated with malware.
– Review installed programs & browser extensions
Hackers may install unwanted software or malicious browser extensions to maintain access to your system.
- Why it works: Malicious software and extensions can allow attackers to monitor your activity, steal data, or control your PC remotely.
How to do it:
- For installed programs, go to Control Panel > Programs > Uninstall a Program and look for any unfamiliar or suspicious software.
- For browser extensions, open your browser’s extension menu (e.g., chrome://extensions in Chrome or about:addons in Firefox) and check for extensions that you didn’t install or that look suspicious.
- If you find anything unfamiliar, consider removing it.
– Scan your PC for malware, spyware, and keyloggers
Malware, spyware, and keyloggers are commonly used by hackers to monitor your activities or gain access to your data.
- Why it works: These malicious programs can run in the background without your knowledge, logging keystrokes, stealing sensitive information, or allowing remote access to your PC.
How to do it:
- Run a full system scan using your antivirus software. If you don’t have antivirus software, download a trusted program like Windows Defender (built into Windows) or a third-party option like Malwarebytes.
- Make sure to run regular scans and keep your software up to date for the best protection.
– Check network activity for unusual data transfers
Hackers often use your internet connection to send data from your computer to a remote server or receive commands.
- Why it works: Unusual or high network activity can be a sign that data is being transferred without your knowledge, potentially revealing that your PC has been compromised.
How to do it:
- Open Task Manager and go to the Performance tab to monitor your network activity.
- You can also use Resource Monitor (search in the Start Menu) to check which processes are using your network connection.
- If you notice any processes that are transferring unusually high amounts of data or accessing the internet without reason, they could be part of a hack.
– Review Windows event logs for unauthorized logins
Windows keeps detailed logs of system activities, including login attempts and user actions.
- Why it works: Unauthorized logins or suspicious activity in event logs could point to a hacker trying to access your system or account.
How to do it:
- Press Win + R, type eventvwr.msc, and hit Enter to open Event Viewer.
- Go to Windows Logs → Security to review login attempts and look for any failed login attempts or logins from unfamiliar devices or locations.
- You can filter the logs to find successful logins that occurred when you weren’t using the computer.
– Verify if your webcam or microphone is being used without permission
Hackers can activate your webcam or microphone to spy on you without your knowledge.
- Why it works: Unauthorized access to your webcam or microphone is a common tactic for hackers to secretly record video or audio.
How it works:
- Check the camera and microphone indicators in your system tray or taskbar to see if they are active when you aren’t using them.
- You can also use Task Manager to monitor which processes are using these devices. Look for any suspicious processes running in the background that may be using your camera or microphone.
- To prevent this, ensure that your webcam and microphone are disabled or covered when not in use. In Windows, go to Settings > Privacy and select Camera and Microphone to control which apps have access to them.

What to do if your PC has been hacked
It’s critical to take immediate action to reduce damage, safeguard your personal information, and get rid of any dangerous software if you think your computer has been compromised. To take back control of your system, follow these instructions.
– Cut off your internet connection right away.
Disconnecting your computer from the internet is the first step in preventing hackers from remotely accessing your system.
How to accomplish it:
- If your connection is wired, unplug the Ethernet cord.
- Switch off your router or unplug your device to switch off Wi-Fi.
- This stops the intruder from gaining remote access, downloading malware, or stealing more data.
– Enter safe mode to conduct additional research
Only necessary system files are loaded in safe mode, which stops viruses and hacking tools from operating in the background.
How to enter safe mode when booting up (Windows 10/11):
- Holding down Shift while selecting restart from the power menu will restart your computer.
- Navigate to startup settings → advanced options → troubleshoot → restart.
- For optimal security, choose to enable safe mode with networking (or without networking).
– Perform a thorough malware and antivirus scan on the system
To find and get rid of any dangerous software, use a reliable antivirus or anti-malware product.
Suggested security equipment:
- (Included in Windows 10/11) Windows Defender
- Malwarebytes (to get rid of sophisticated malware)
- Bitdefender, Norton, or Kaspersky (for protection and thorough scans)
- To verify all files and processes, do a thorough system scan rather than a rapid one.
– Remove any dubious apps and browser add-ons
Verify the installed apps:
- Navigate to Settings → Apps or Control Panel → Programs & Features (Windows 10/11).
- Examine and remove any apps that seem suspicious or unfamiliar.
- Verify the browser’s extensions:
- Go into the settings of your browser and uninstall any unknown extensions (Chrome, Firefox, Edge).
- If required, restore your browser’s default settings.
– Enable two-factor authentication (2FA) on all accounts
Your login credentials may have been taken if a hacker managed to get onto your computer.
Change the passwords for the following on a different, sanitized device (a phone or another PC):
- Email addresses
- Financial services and banking
- social media networks
- any other important internet accounts
Make sure your password is secure: At least twelve characters, comprising both capital and lowercase letters, numerals, and symbols.
– All accounts should have two-factor authentication (2FA) enabled.
- By requiring a second verification step (such as a one-time code texted to your phone), 2FA adds an additional degree of protection.
- How to make 2FA active:
- Go to each online account’s security settings and turn on 2FA (Google, Facebook, Microsoft, etc.).
- For increased protection, use an authenticator app such as Microsoft Authenticator or Google Authenticator instead of SMS.
– Check online accounts for illegal logins
Reviewing login activity is a feature offered by several services.
- Google: Visit the Google Security Checkup website.
- Facebook: To access your current login, navigate to Settings → Security and Login.
- Similar options are available under security settings for companies like Amazon, Apple, Microsoft, and others.
- Change your password right away and log out of all devices if you notice any unauthorized logins.
– Use system restore or reset to return your computer to its former safe state
Reverting to a previous state helps eliminate dangers if your computer has been compromised.
How to use system restore:
- In Windows, look up “create a restore point” online.
- Choose a restoration point prior to the attack, click System restoration, and then adhere to the instructions.
How to reset Windows (if needed):
- Go to settings → update & security > recovery.
- Choose reset this PC and select “keep my files” (for a partial reset) or “remove everything” (for a full wipe).
– Monitor bank statements & online activity for fraud
- If your passwords or personal data were stolen, hackers might try to access your financial accounts.
What to do:
- Check recent transactions in your banking and credit card accounts.
- Enable fraud alerts with your bank or credit card provider.
- Report any unauthorized transactions immediately to prevent further issues.
– Consider reinstalling Windows for a fresh start
- If the hack was severe and malware persists, reinstalling Windows may be the best option.
How to reinstall Windows:
- Download the Windows Media Creation Tool from Microsoft’s website.
- Create a bootable USB drive and perform a clean installation.
- A fresh installation ensures all malware and hacker traces are completely removed.

How to prevent future hacks & strengthen security
Proactive steps to protect your devices, accounts, and online activity are necessary to prevent cyberattacks. You may lower the chance of hacks and shield your private information from online predators by putting strong security procedures in place.
– Keep Windows, software, and drivers updated
Outdated software can have security vulnerabilities that hackers exploit. Keeping your system up to date ensures you have the latest security patches.
- Enable automatic Windows updates by going to Settings > Update & Security > Windows Update.
- Regularly update third-party software, including browsers and productivity apps.
- Keep device drivers up to date to prevent exploits through hardware vulnerabilities.
– Use strong passwords & a password manager
Weak passwords make it easier for hackers to access your accounts. Strengthen your security by:
- Creating unique passwords for each account with at least 12–16 characters, including letters, numbers, and symbols.
- Using a password manager to generate and store complex passwords securely.
- Enabling multi-factor authentication (MFA) to add an extra layer of protection.
– Enable Windows Defender or use a trusted antivirus
A reliable antivirus program protects against malware, spyware, and phishing attacks.
- Windows Defender provides built-in real-time protection—ensure it’s enabled in Windows Security settings.
- Consider third-party antivirus software for added protection, especially if you download files frequently.
- Run regular full system scans to detect and remove threats.
– Avoid downloading files from untrusted sources
Malware often spreads through suspicious downloads. Stay safe by:
- Downloading software only from official websites or trusted app stores.
- Avoiding torrents and cracked software, as they often contain malware.
- Scanning downloaded files with Windows Defender or antivirus software before opening them.
– Be cautious with email attachments & phishing links
Phishing attacks trick users into revealing personal information. Protect yourself by:
- Avoid clicking on links in unsolicited emails or messages.
- Verifying the sender’s email address before opening attachments.
- Checking for spelling errors, urgency, or unusual requests, which are common phishing signs.
- Hovering over links before clicking to check if they lead to a legitimate website.
- If you receive an email from a bank or service provider asking for personal details, contact them directly instead of clicking any links.
– Enable a firewall & secure your router settings
Firewalls act as a barrier between your PC and malicious online threats. To enhance network security:
- Ensure Windows Firewall is enabled in Control Panel > System & Security > Windows Defender Firewall.
- Change your router’s default login credentials to a strong, unique password.
- Use WPA3 or WPA2 encryption on your Wi-Fi to prevent unauthorized access.
- Disable remote access to your router unless necessary.
– Use a VPN when accessing sensitive information
A virtual private network (VPN) encrypts your internet traffic, keeping your online activities private. Consider using a VPN when:
- Connecting to public Wi-Fi networks to prevent data interception.
- Accessing banking and financial accounts on unsecured connections.
- Avoiding tracking and geo-restrictions on certain websites.
– Regularly back up your important files
In case of a cyberattack, having backups ensures you don’t lose valuable data. To protect your files:
- Set up automatic backups to an external hard drive or cloud storage.
- Use services like OneDrive, Google Drive, or iCloud for cloud backups.
- Keep a separate offline backup for added security against ransomware.
– Monitor your accounts & set up alerts for unusual activity
Hackers often try to gain access to accounts without immediate detection. Stay vigilant by:
- Checking bank statements and online accounts for unauthorized transactions.
- Enabling account activity alerts on banking, email, and social media platforms.
- Use Have I Been Pwned (https://haveibeenpwned.com/) to check if your credentials have been leaked in a data breach.
– Educate yourself on the latest cybersecurity threats
Hackers constantly develop new methods to steal information. Staying informed helps you stay ahead of cyber threats.
- Follow trusted cybersecurity blogs and news sources.
- Learn to recognize new phishing tactics and social engineering scams.
- Stay updated on new security features in Windows and other software.


