It’s relatively rare for a podcast to last 14 years, especially a fiction one. In fact, as far as I can tell, Welcome to Night Vale is the longest continually running fiction podcast out there. (Some will argue it’s actually We’re Alive, but that has taken a few significant breaks between seasons.) The story of Night Vale, the titular desert town, now spans 12 seasons, over 280 episodes, three books, and at least 10 live standalone shows. While dedicating several hundred hours of your life to listening to every episode might seem like a big ask, I believe you’ll be hooked once you dive in.
Technology
How to know if your computer got hacked, what to do next
Have you ever had that sinking feeling that something’s not quite right with your computer? Maybe it’s running slower than usual or there are new icons on your desktop that you don’t recognize. Well, you might not be just imagining things; you could have been hacked.
While the first reaction may be to panic, the best possible first step if you think you’ve been hacked is to disconnect your computer from the internet and take a deep breath. If you’ve got antivirus software already installed, run the scan immediately. But don’t worry just yet. Before you start fretting about cyberthieves and lost data, let’s take a moment to walk through some crucial steps together. From running a trusty antivirus scan to the nitty-gritty of browser settings and remote access – this is your go-to guide for outsmarting those pesky hackers.
GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE
A woman grabbing her computer in frustration (Kurt “CyberGuy” Knutsson)
Were you hacked?
1. Run antivirus software ASAP
When you’re running any antivirus scans or troubleshooting, start from the actual antivirus software program. Don’t follow pop-ups or notifications. If there is indeed a compromise, it should show up on the dashboard of the antivirus software program.
Preventative:
- Keep your antivirus software updated. Hackers are coming up with new viruses often, so if you are up to date, you’re less likely to be compromised. Or the virus is more likely to get caught.
- Be familiar with your antivirus software notifications and alerts, so if you ever get a pop-up or notification, you’ll be more apt to notice fake ones.
- Write down the contact information of the antivirus software you’ve installed and have it near the computer.
If you feel pretty confident that you’ve unfortunately been hacked, but your antivirus scan comes up empty, take a break and call customer service of antivirus software directly. Do not follow links to have a rep call you. Use the number you’ve written down, and call them directly so you know you’re not being duped.
If you don’t have antivirus software installed, make sure to install one and do a computer scan. You can find our top recommendations here.
ASK ANY TECH QUESTION AND GET KURT’S FREE CYBERGUY REPORT NEWSLETTER HERE
A man typing on keyboard (Kurt “CyberGuy” Knutsson)
HOW TO RECOVER A HACKED FACEBOOK ACCOUNT
2. Reformat or reset to factory settings
Sometimes a virus or other nefarious entities have overrun the computer so badly that you might need to simply reformat or reset it to factory settings. If you’ve uninstalled or deleted suspicious programs or applications only to have them reload upon restarting your computer, you may simply need to start from scratch. This is why it is crucial to have recent backups of your data. Our article, “How to securely get rid of your old PC or Mac,” outlines how to reset to factory settings or reformat your computer.
EXPERT TIPS, LEGIT REVIEWS. GET THE FREE CYBERGUY REPORT NEWSLETTER
3. Delete settings or extensions on browsers or uninstall and reinstall browsers completely
There have been many times I have gone to help my mom with her online accounts, only to be inundated with pop-ups, redirects or random links on her browser bar or menu. It turned out that she had either accidentally downloaded extensions that embedded themselves in the browser or, worse, changed the browser setting to open a spammy website as her main search engine or landing page. You can go to settings or preferences and delete extensions you do not recognize. But if these settings or extensions keep reappearing after deleting and restarting the browser, it is likely a bigger problem. Then, uninstall the browser and see if you can reinstall it. If that brings up the same settings again, then it could be a much more invasive virus or malware that needs to be addressed with an antivirus scan or assistance from a professional.
HOW TO OUTSMART CRIMINAL HACKERS BY LOCKING THEM OUT OF YOUR DIGITAL ACCOUNTS
4. Turn off or restrict remote access
While it is harder for hackers to access your computer if it is completely turned off, if you have allowed remote access, a hacker just needs your computer to be hooked up to a network or the internet in order to take over your device and turn it on.
To prevent remote access to your PC:
- Click the Windows Start button
- Input Remote Desktop settings in the search bar
- In the Remote Desktop settings, ensure that the slider under “Enable Remote Desktop” is set to Off.
- Review your current processes in Task Manager (Ctrl+Alt+Del) for any unusual or suspicious activities
To prevent remote access on Macs:
- Click the Apple logo icon in the top left corner.
- Click System Settings
- Tap General
- Click the Sharing icon
- Scroll down and uncheck the boxes next to Remote Login and Remote Management to prevent unauthorized remote access.
A woman on her laptop (Kurt “CyberGuy” Knutsson)
HOW HACKERS CAN CRAFT AN ATTACK FROM YOUR SOCIAL MEDIA PROFILE
5. Review your activity monitor on your computer and network traffic patterns
Periodically, checking your computer’s activity monitor to check which programs are running and what is using up the most bandwidth is a healthy practice. It will teach you to spot any programs or traffic that is unusual or if someone else is connecting to your computer remotely.
To review this activity on your PC:
- Go to Control Panel
- Click Administrative Tools
- In Event viewer, look for the events that are related to startup and shutdown. Any shutdown will be listed there and which program or user-initiated that startup or shutdown. This way, you can see if these actions are that of a virus or an update process.
To review this activity on your Mac:
- Go to the menu bar on the top left when you first log on to your account.
- Select Go
- In the drop-down menu, select Utilities
- When a menu pops up, one of the first options should be Activity Monitor.
Or:
- Go to your Applications folder on your dock (usually located on the bottom or right-hand side of the screen)
- Go to Utilities folder
- Select Activity Monitor
A man putting in his username and password on tablet (Kurt “CyberGuy” Knutsson)
Top 3 preventative measures to not get hacked
1. Turn on 2-factor authentication
While it may seem like a pain to enter a code received via email or text each time you sign in, this extra step is crucial for security. By activating two-factor authentication, you create a barrier against unauthorized access. Even if a hacker discovers your email or username, they won’t get far without the unique code.
Each login attempt triggers a notification, alerting you to potential threats. Repeated failed attempts will secure your account by either locking it or sending you an alert. In the event of suspicious activity, you can swiftly use a trusted device to reset your password and inform the service provider. It’s a small price to pay for significant protection against cyberthreats.
A man backing up his computer (Kurt “CyberGuy” Knutsson)
2. Have strong antivirus software
The best way to protect yourself from clicking malicious links that install malware in an attempt to get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Plus, think of it like having a digital bodyguard – always on the lookout, always ready to defend you from cyberthreats. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices.
3. Configure your email settings
Configure email settings to not automatically images or attachments (Kurt “CyberGuy” Knutsson)
If you configure your email settings to not automatically load content such as images or attachments, then it is harder for viruses or other malware to be automatically downloaded or accidentally opened. If you also have emails received first in rich text format, you can choose which emails load fully with images once you realize it is from a trusted source.
Gmail desktop:
- Click the settings gear icon
- Choose See all settings
- Under the General tab, scroll to the Images section.
- Select Ask before displaying external images
- Scroll to the bottom of the page and click Save Changes
Gmail mobile:
- Tap the hamburger menu (3 horizontal lines)
- Select Settings
- Choose the account you want to manage
- Scroll to the Images section and select Ask before displaying external images.
Apple mail:
- First, click on Mail in your dock at the bottom of your screen
- Then click on Mail in the upper left of your screen
- Click Settings
- Go to the Viewing tab
- Uncheck Load remote content in messages
Outlook desktop (PC):
- Click File
- Choose Options
- Select Trust Center
- Click Trust Center Settings
- Under Automatic Download, check the option that says Don’t download pictures automatically in standard HTML email messages or RSS items.
Outlook desktop (Mac):
- Open Outlook
- Click Preferences
- Under Email select Reading
- Choose Security
- Select Never to prevent image downloads
Yahoo Mail desktop:
- Click Settings.
- Choose More Settings.
- Click Viewing email.
- Under Show images in messages, select Ask before showing external images.
Start Mail desktop:
Please note that the exact wording of the menu items and options can vary based on the version of Start Mail you are using.
- Open Start Mail
- Click on the Settings icon
- Navigate to the Email section
- Look for the Images or Privacy settings
- Choose the option to Ask before displaying external images or a similar setting that controls the automatic downloading of pictures.
These steps should help enhance your email security by giving you control over which images are displayed, thereby reducing the risk of malware being automatically downloaded or opened. Always ensure your email application is updated to the latest version for the best security practices.
Looking for private and secure email solutions? See Best Private and Secure Email Providers 2024
QUICK TIPS. EXPERT INSIGHTS. CLICK TO GET THE FREE CYBERGUY REPORT NEWSLETTER
Data recovery: Protecting your information against loss
This may not seem relevant to an article about hacking, but having your data off your computer and safely on an external hard drive or the cloud will give you more options if you think you’ve been hacked. If you need help deciding what type of data backup would be best for you, please take a look at these articles:
If a hack is bad enough, sometimes a complete wipe of your system is the only way to salvage your computer. If you have a safe copy of your data, while it might be inconvenient, you will not lose all your data. Also, if you keep more sensitive data off your more frequently used computer, then your data is less likely to be compromised if you get hacked.
Kurt’s key takeaways
At the end of the day, being hacked is a massive inconvenience and can potentially lead to data loss or theft. But don’t lose hope. There are steps you can take to outsmart those pesky hackers and keep your devices secure. The key is staying vigilant and taking preventative measures like using strong antivirus software, enabling two-factor authentication and regularly backing up your data. That way, if you do get hacked, you’ll have a recent backup to rely on and can simply wipe your device clean without losing everything.
It’s also crucial to keep an eye out for any suspicious activity on your computer or network. If something seems off, don’t hesitate to run a full antivirus scan and review your activity monitor for any unauthorized access or programs running in the background. Remember, hackers are always coming up with new tricks, so it’s an ongoing battle to stay one step ahead. But by following the tips outlined here, you’ll be well on your way to keeping your digital life secure and hack-free. Stay vigilant, my friends.
Can you share a personal story where being proactive about computer security paid off or, conversely, where neglecting it led to issues? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on Facebook, YouTube and Instagram.
Answers to the most asked CyberGuy questions:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
You need to listen to the cosmic horror-comedy podcast Welcome to Night Vale
The show is written by Joseph Fink and Jeffrey Cranor, who draw heavily on the work of H.P. Lovecraft. Every season has its own arc, but broadly, the show tells the story of a town that exists in an alternate version of Earth. In this town Angels are real, but acknowledging their existence is illegal; librarians are dangerous creatures with “thousands of spiny legs” and “pincers”; and there is a Faceless Old Woman who secretly lives in your home.
These are clearly unsettling concepts when taken at face value. But rather than trying to scare the listener, Cranor and Fink lean into the natural absurdity of cosmic horror and refuse to take themselves too seriously. They also routinely subvert the bigotry of their inspiration, using Lovecraftian creations to tell stories rich with LGBTQ+ characters.
Of course, having well-written scripts and telling a compelling story is only part of the equation. What elevates Welcome to Night Vale to true greatness is the cast, especially narrator Cecil Baldwin, who plays the host of the central radio show, Cecil Palmer. Cecil’s voice has the gravitas to tell ominous stories of secretive government agencies and ancient gods. But he has the range to deliver light-hearted banter with a sentient patch of haze (her name is Deb, in case you were wondering).
Cecil Baldwin has the charisma to make even the reading of a repair manual for a toaster compelling. He can be creepy, funny, or soothing, often all within the same episode. (For this reason, I don’t suggest listening to Night Vale at night. I have fallen asleep to the dulcet sounds of Baldwin’s voice several times, only for the more unsettling parts of the show to make their way into my dreams.)
Every episode also features a musical interlude in the guise of “The Weather.” The show mostly features lesser-known artists, but alumni include Jason Isbell, The Mountain Goats, Waxahatchee, Angel Olsen, Open Mike Eagle, and Sylvan Esso.
Welcome to Night Vale is also a great way to introduce younger listeners to horror. I would never suggest my eight-year-old read H.P. Lovecraft. Partly because the man’s unrepentant racism is baked into the very fabric of his stories, but also because the violence is often too much for children. Night Vale, on the other hand, takes those horrors and exposes them for what they are: entertainment. I can put the podcast on, bond with my kid over their burgeoning love of all things creepy and weird, and trust that they’ll walk away with a good message.
Welcome to Night Vale is available on most podcast platforms, including Apple Podcasts, Pocketcasts, YouTube, and Spotify.
Technology
New personal eVTOL promises personal flight under $40K
NEWYou can now listen to Fox News articles!
Personal electric aircraft have teased us for years. They look futuristic, promise freedom from traffic, and usually come with prices that put them out of reach or timelines that feel uncertain. Recently unveiled at CES 2026, the Rictor X4 entered that conversation with some bold claims.
It is a single-passenger electric vertical takeoff and landing aircraft designed to make short-range personal flight more accessible and far more affordable. If those promises hold up, it could change how we think about flying for everyday trips.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter
CES 2026 put health tech front and center, with companies showcasing smarter ways to support prevention, mobility and long-term wellness. (CES)
TECH STARTUP, MAJOR AIRLINE PARTNER TO LAUNCH ELECTRIC AIR TAXI SERVICE
What the Rictor X4 actually is
The Rictor X4 uses a multirotor design with eight propellers spread across four carbon fiber arms. Those arms fold inward when the aircraft is not in use, allowing it to fit in the bed of a pickup truck. The aircraft focuses on low-altitude flight and short hops rather than long journeys.
Key specs include:
- Top speed of about 50 mph
- Maximum flight time of 20 minutes
- Payload capacity of up to 220 pounds, including the pilot
It can lift off and land vertically like a helicopter, then transition into forward flight once airborne. Rictor describes its mission as light aerial mobility, which essentially means short-distance commuting and professional applications.
Inside the X4’s propulsion and power system
According to Rictor, the X4’s propulsion system is built around stability and redundancy rather than raw speed. Each axis uses a coaxial dual-motor configuration designed to provide consistent thrust during low-altitude flight.
Key propulsion details include:
- Rated thrust of up to 165 pounds per axis
- Peak thrust exceeding 285 pounds per axis
- Maximum continuous power output of 10 kW
- 120-volt operating system designed for outdoor conditions
Together, these systems aim to deliver controlled, predictable flight with built-in safety margins, especially during takeoff, landing and hover.
The Rictor X4 is a single-passenger electric aircraft designed for short-range, low-altitude flight with a folding multirotor layout. (Rictor)
Safety systems and flight control in the Rictor X4
Rictor puts safety at the center of the X4’s design. The aircraft uses a semi-solid state battery system with dual battery redundancy, which helps enable a controlled landing if one battery module fails. In addition, an emergency parachute system provides backup protection during critical situations. At the same time, a centralized flight control system actively manages propulsion, attitude and overall system health. This system continuously monitors key flight data to help maintain stability in changing conditions.
Beyond software, the hardware plays an important role. The X4 features 63-inch carbon fiber folding propellers in a 4-axis, 8-propeller configuration. Together, they support a payload of up to 220 pounds, including the pilot. According to Rictor, the aircraft is designed to operate at noise levels below 65 decibels, although independent testing has not yet been published. Finally, Rictor’s proprietary Dynamic Balance Algorithm adjusts the output of all eight motors in real time. As a result, the X4 can maintain a stable hover even in side winds rated up to Level 6.
The FAA rule that could make personal flight easier
One of Rictor’s most attention-grabbing claims involves regulation. The company says the X4 is designed to comply with FAA Part 103, which governs ultralight vehicles in the U.S. If operated within Part 103 limits, the X4 could be flown legally without airworthiness certification or a pilot’s license. Rictor says this is enabled by autonomous pre-programmed flight paths and very low altitude operation, reportedly as low as three meters above ground. It is worth noting that Part 103 still carries operational restrictions, including where and how flight can occur. Final compliance depends on real-world use and FAA interpretation.
Designed to fold, transport, and recharge
Portability is a major focus. Rictor says the X4 folds down to about 42 cubic feet, which makes it compact enough to transport in the bed of a pickup truck. The company also highlights in-vehicle charging support while parked or on the move, positioning the X4 as something that can be transported and recharged alongside ground vehicles rather than stored at an airfield.
AIR TAXI SERVICE PLANS EVTOL RIDES FROM ALL THREE NYC AIRPORTS
The price that resets expectations
The Rictor X4 carries a launch price of $39,900 with a $5,000 deposit. That alone separates it from most personal eVTOLs currently discussed in the market. The aircraft is produced by Kuickwheel Technology, Rictor’s parent company. According to the company, first customer deliveries are scheduled for Q2 2026. As with any aircraft launch, timelines remain aspirational until production units reach customers.
Why this matters now
Personal eVTOLs have lived in a narrow space between concept and reality. High costs, regulatory hurdles and safety concerns have slowed adoption. If Rictor delivers an aircraft that performs as described while operating within ultralight rules, it could expand personal flight beyond niche enthusiasts and into practical short-range use. Now it comes down to whether the company can deliver on what it’s promising.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com
Kurt’s key takeaways
The Rictor X4 brings together aggressive pricing, compact design and regulatory positioning in a way we have not seen before. Folding propellers, redundant safety systems and Part 103 alignment make it one of the most ambitious personal eVTOL launches to date. The unanswered questions center on real-world performance, regulatory interpretation and production readiness. Until aircraft are flying outside controlled demonstrations, healthy skepticism remains warranted. Still, this is one of the most compelling personal flight announcements to come out of CES in recent years.
Would you trust a personal eVTOL like this for everyday trips, or does flight still feel like a step too far for now? Let us know by writing to us at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Microsoft’s first Windows 11 update of 2026 stopped some computers from shutting down
Microsoft has identified issues upon installing the January 2026 Windows security update. To address these issues, an out-of-band (OOB) update was released today, January 17, 2026.
– Connection and authentication failures in remote connection applications: This issue affects multiple platforms including Windows 11, version 25H2; Windows 10, version 22H2 ESU; and Windows Server 2025. See the bottom of this message for the complete list of affected products.
-Devices with Secure Launch might fail to shut down or hibernate: This issue only affects Windows 11, version 23H2.
-
Montana1 week agoService door of Crans-Montana bar where 40 died in fire was locked from inside, owner says
-
Delaware1 week agoMERR responds to dead humpback whale washed up near Bethany Beach
-
Virginia1 week agoVirginia Tech gains commitment from ACC transfer QB
-
Montana1 week ago‘It was apocalyptic’, woman tells Crans-Montana memorial service, as bar owner detained
-
Minnesota1 week agoICE arrests in Minnesota surge include numerous convicted child rapists, killers
-
Lifestyle4 days agoJulio Iglesias accused of sexual assault as Spanish prosecutors study the allegations
-
Oklahoma1 week agoMissing 12-year-old Oklahoma boy found safe
-
Oregon1 week agoDan Lanning Gives Oregon Ducks Fans Reason to Believe