How Hackers Hack Laptops & PCs — and How to Protect Yourself
How attackers compromise Windows and Mac computers — and how to defend yours.
🛡️
Defender's Guide
This is a defender-focused resource covering attack patterns at a conceptual level so you can recognise threats and protect yourself or your organisation. The page does not include step-by-step exploitation procedures. If you suspect you are currently being targeted or have been compromised, scroll to the recovery section below.
What attackers want from Laptops & PCs
Laptops and PCs hold more of most people's digital lives than any other device — work accounts, personal accounts, saved passwords, financial documents, photos, browser history with years of accumulated sessions. A compromised laptop is functionally a compromise of essentially every online account that device has logged into, plus any local data. The stakes are high and the defender-awareness bar is often low.
The realistic threat profile for typical users is dominated by malware delivered through a few consistent vectors: phishing links leading to credential-harvesting or malware installation, drive-by downloads on compromised or malicious websites, pirated software bundles, malicious browser extensions, and USB/removable-media attacks. Physical-access attacks matter (laptop theft, "evil maid" attacks on unattended devices) but are less common than remote attacks for most users. State-grade targeted attacks apply only to high-profile individuals.
The defensive baseline has shifted substantially since 2020. Modern Windows (11 with TPM, Credential Guard, Core Isolation) and modern Mac (Apple Silicon with Secure Enclave, System Integrity Protection, Lockdown Mode for high-risk users) ship with meaningfully better default security than earlier generations. Users on outdated operating systems (Windows 10 approaching end-of-support, older macOS versions) are disproportionately represented in compromise statistics. Keeping current matters more than elaborate configuration.
How attackers actually do it
Conceptual attack categories, not exploitation procedures. Understanding these patterns is what lets you recognise and defend against them.
Phishing-delivered malware via email and messaging
Dominant infection vector for typical users. Attacker sends a convincing email with a malicious attachment (macro-enabled Office document, ISO file containing an executable, HTML phishing page) or a link to a malicious site. User opens the attachment or clicks through to malware. Credential stealers, banking trojans, and ransomware all distribute primarily this way.
Malicious or pirated software installation
Downloaded executables from untrusted sources frequently bundle malware. "Cracked" commercial software, game cheats, free versions of paid software, "free VPNs" — all are high-risk distribution channels for credential stealers and remote-access trojans. The pattern is so consistent that "downloaded cracked software" is a near-universal finding in incident investigations involving personal devices.
Malicious browser extensions
Extensions with broad permissions can read any web page, steal session cookies, capture form input, and exfiltrate credentials. Chrome Web Store and Mozilla Add-ons have malicious-extension removal processes but extensions sometimes remain live for weeks or months with large user bases before detection. "Productivity enhancer" and "screenshot tool" categories are frequently abused.
Drive-by downloads and malicious advertising
Compromised legitimate websites and malicious advertising networks occasionally deliver malware through browser vulnerabilities or convincing fake-update prompts. Browsers (Chrome, Firefox, Edge, Safari) are increasingly resistant to these; outdated browsers remain vulnerable. "Update your Flash Player" or "Your browser is out of date" pop-ups on random websites are essentially always malicious.
USB / removable-media attacks
Malicious USB drives (the classic "dropped in the parking lot" scenario is real, not just a movie trope), USB-based attacks via HID devices (Rubber Ducky and similar tools), and infected external drives from compromised friends or workstations. Corporate environments especially susceptible; also hits individuals sharing files via USB with less-secure contacts.
Unpatched OS and application vulnerabilities
Users running outdated Windows or macOS versions, or using unpatched versions of major applications (browsers, Office, Adobe products), accumulate known-exploitable vulnerabilities. Modern exploitation chains routinely target these. "But it still works" is not a security argument; unsupported software is in the process of becoming a compromise vector.
Physical access attacks on unattended devices
"Evil maid" attacks — brief physical access to an unlocked or weakly-protected device — can install persistent compromise. Laptop theft is the higher-probability physical attack for most users; device recovery is sometimes possible but data recovery without disk encryption is essentially impossible. Full-disk encryption (BitLocker on Windows, FileVault on Mac) is mandatory for any laptop that leaves your home.
Remote Access Trojans via social engineering
Attackers convince users to install legitimate remote-access tools (AnyDesk, TeamViewer) under pretexts ("Microsoft Support calling about your computer", "IT needs to fix a problem"). Grant attacker full control. Tech-support scams targeting older users are the canonical example; corporate help-desk social engineering also occurs.
How to recognise compromise
Signs that your laptops & pcs may have been compromised:
Unexpected slowdown, overheating, or fan activity
Cryptomining malware, background data exfiltration, and spyware all consume CPU/GPU resources. Sustained unexplained resource use — especially when the device is idle — warrants investigation. Task Manager (Windows) / Activity Monitor (Mac) shows per-process resource use.
Browser showing unexpected homepage, search engine, or extensions
Browser hijacker malware modifies these settings. If your homepage or default search engine changed without your action, or unfamiliar extensions appeared, investigate. Reset browser settings as a starting recovery step.
Antivirus alerts you did not trigger
Antivirus flagging something = investigate, do not dismiss. Even if the specific alert seems minor, treat as a signal to scan the full system and review recent activity. Dismissing AV alerts is one of the most common ways early-stage malware becomes long-dwell-time compromise.
Unfamiliar processes running or applications installed
Regular review of installed applications (Settings → Apps on Windows, Applications folder on Mac) surfaces unfamiliar entries. Anything you did not install is suspicious.
Accounts showing login activity from unfamiliar locations
If your email, social media, or banking accounts show sessions from IPs you do not recognise, the machine holding those session tokens may be compromised, not just the accounts themselves.
Suspicious pop-ups or ads outside the browser
Advertisements appearing on the desktop outside any open browser, or new browser windows opening unprompted — both strong indicators of adware or more serious infection.
Defender / antivirus disabled without your action
Some malware disables the built-in security software to prevent detection. Windows Security or macOS XProtect showing disabled when you did not disable it = immediate-action signal. Re-enable and run a full scan before any further use of the device.
What actually protects you
Concrete actions ranked by impact. Items marked critical are the highest-leverage protections; do those first.
Keep the OS and all applications current
Enable auto-update for the operating system and for every application that supports it. Replace Windows 10 machines before October 2025 end-of-support if possible. Replace Macs that no longer receive updates. This single practice eliminates most realistic remote-exploitation paths.
Full-disk encryption on every laptop
BitLocker (Windows) or FileVault (Mac) — enable them. Both are free, built-in, and essentially transparent in daily use. Without them, laptop theft becomes data compromise; with them, a stolen laptop is just a stolen laptop. Required baseline for any portable device.
Screen lock with short timeout
Lock on sleep; auto-lock after 5-10 minutes of inactivity; strong password or biometric. Windows Hello / Touch ID make short timeouts painless. Protects against brief unattended-access scenarios (coffee shops, shared offices).
Use a password manager with unique strong passwords
Bitwarden, 1Password, KeePassXC — pick one and use it. Do not save passwords in the browser as the only copy; password managers are purpose-built for this and survive browser compromises better.
Limit application installation to official sources
Windows: Microsoft Store, official vendor sites, reputable software distributors. Mac: Mac App Store or official vendor sites. Avoid pirated software, "cracked" versions, and downloads from random sites. This single practice eliminates the largest malware vector for typical users.
Audit browser extensions quarterly
Remove extensions you do not actively use. Review permissions on remaining extensions — anything requesting "read all site data" warrants scrutiny. Malicious extensions often acquire their user base over years; periodic audit catches the ones that went bad.
Run scheduled antivirus scans
Windows Defender (built-in) is solid for most users. Supplement with Malwarebytes periodic scans if you want defence-in-depth. Mac users: XProtect (built-in) plus Malwarebytes periodic scans. Free AV is generally adequate for typical users; paid AV adds modest value for most.
Separate administrator and daily-use accounts
On Windows, create a standard user account for daily use and use the admin account only for software installation. Reduces blast radius of most malware by running daily activities without admin privileges. Mac does this partially by default but the same principle applies.
Back up important data offline
Ransomware specifically targets connected backups (cloud drives, network shares). Offline backups — external drives disconnected when not actively backing up — survive ransomware attacks that encrypt connected storage. 3-2-1 backup rule: 3 copies, 2 different media, 1 offsite/offline.
Lockdown Mode for Mac users at elevated risk
Apple's Lockdown Mode (Settings → Privacy & Security) disables certain features that have been exploit vectors — link previews, some attachment types, JIT-compiled JavaScript. Some compatibility tradeoffs. Worth enabling for journalists, activists, executives, anyone receiving Apple's state-sponsored-attack warning.
Frequently Asked Questions
Windows Defender (built-in) is adequate for typical users. Third-party AV (Malwarebytes, Bitdefender, ESET) adds detection depth but is not strictly necessary for most users who follow other practices (apps from official sources, keep OS updated, careful with email attachments). Avoid free AV of uncertain provenance — some "free AV" products are themselves malicious or aggressively monetise user data.
Somewhat historically, less so in recent years. macOS malware has grown substantially — Pegasus-class spyware targets Macs, general-purpose macOS malware families exist (Amos/Banshee/AtomicStealer are currently active). The gap between Windows and Mac in malware volume has narrowed. Mac users should run the same defensive practices as Windows users; the "Macs are safe" myth is substantially out of date.
On untrusted Wi-Fi (coffee shops, hotels, airports, conferences) — yes, a reputable commercial VPN (Mullvad, ProtonVPN, IVPN) prevents many network-level attacks. At home on your own Wi-Fi, a VPN provides privacy benefits (ISP sees less of your traffic) but modest security benefit if the Wi-Fi is already secure. Avoid free VPNs — many monetise by selling user data or are outright malicious.
Running outdated operating systems. Windows 7 users who continued past end of support, Mac users on versions that no longer receive security updates, Windows 10 users ignoring the 2025 end-of-support date. Every patch Tuesday after end-of-support adds known-exploitable vulnerabilities that will never be fixed. Running unsupported OS is the most consistent single factor in consumer compromise.
Indicators listed in the Signs section above: unexpected slowdown, unfamiliar processes, disabled security software, unexpected pop-ups, accounts showing unfamiliar login activity. None are definitive alone. For high-suspicion: run Malwarebytes (free) full scan, check for unusual processes in Task Manager/Activity Monitor, review installed applications. For confirmed infection, factory reset is more reliable than trying to remove malware piece by piece.
If your hardware supports it — Windows 11. Windows 10 reaches end of support in October 2025; after that, no more security patches. Windows 11 includes substantial security improvements (TPM 2.0 required, Credential Guard, Core Isolation, hardware-backed encryption). For hardware that cannot run Windows 11, either upgrade hardware or switch to Linux (Ubuntu, Mint, Fedora are all good for general use) rather than running unsupported Windows 10.
Dramatically safer. Memorising leads to either weak passwords (memorable = guessable) or password reuse (impossible to memorise 200 unique passwords). Password managers solve both. The concern "what if my password manager is breached" is much smaller than the reality of password reuse — reputable managers (Bitwarden, 1Password, KeePassXC) have strong security and their master-password model means even a breach of their servers does not expose your vault if your master password is strong.
Yes, functionally. Microsoft Update and macOS Software Update are the primary path for security patches; both are reliable and digitally signed. The small risks (rare bad-update incidents, occasional compatibility breakage) are vastly outweighed by the benefits of current software. "I do not trust Microsoft updates" users consistently end up compromised by vulnerabilities patched years earlier.
Encrypts everything on your laptop's storage drive — without the encryption key (your password), the data is unreadable. BitLocker on Windows, FileVault on Mac — both free, built-in, essentially transparent during normal use. You need it on any laptop that ever leaves your home. Without it, stolen or lost laptops become data compromise; with it, they are just lost hardware.
Apple's hardened security mode that disables certain features known to be exploit vectors (link previews, some attachment types, JIT compilation). Some compatibility tradeoffs. Worth enabling for journalists, activists, executives, government officials, anyone receiving Apple's state-sponsored-attack notification, anyone with elevated threat model. Not necessary for typical users.