Windows 11 Hacked: How to Block Incoming Requests Through Bluetooth/Wi-Fi at the Login Screen

Windows-11-Hacked

Windows incoming requests have been a vulnerability issue several users face while interacting with their PCs. The idea of hacking by incoming requests is an old one however, when you are on networks unknown to you, you may fall for the trap easily. Needless to say, it can give away all your data irrespective of how protected you try to be.

The best way to handle these vulnerable requests is to stop the incoming prompts that usually appear from unknown sources when your Wi-Fi/ Bluetooth is turned ON. If you are wondering how to avoid these incoming requests or what can be done to resolve the issue, do not worry, as this post has got you covered!

Keep on reading, as by the end of this blog, you can avoid and handle incoming requests through Bluetooth/Wi-Fi at the login screen. 

How Do These Incoming Requests Turn into Harmful Malware

The way these requests work is quite lethal for your PC. You see, for any hacker to infiltrate your PC, they either need to have direct access to it, or they can reach out to you via the internet (using mail, links, etc.). However, both these ways have declined after user awareness as they are now more alert, but that does not stop a hacker from trying. 

Hackers have found ways to infect a user’s PC with malicious scripts that they run as soon as possible. And that is where these incoming requests come into the frame. With the help of these requests, a hacker sends the prompt asking permission to run a script, and when they are done, they have access to your PC!

For your reference, to understand the issue, we are attaching a genuine problem shared by one of the Windows users about this. 

problem shared by the Windows users

Usually, this tendency of infecting a user’s PC without directly leaving a file or link falls under the use of Fileless malware

Ways to Block Incoming Requests Through Bluetooth/Wi-Fi

Staying diligent and preventing fake incoming requests through Bluetooth/Wi-Fi requests through the login screen is the ultimate solution here. Of course, there are preventive measures that you can take to resolve the issue. 

Here’s what you can do – 

  1. Keep Your Firewall Active 
  2. Use a VPN to Avoid Infiltration Via Location
  3. Always Keep Your PC Updated
  4. Check for Unknown Services & Stop Them

Fix 1 – Keep Firewall Active

When trying to use a third-party application or a cracked file on Windows PC, it often requires you to turn off the firewall directly. In case you have done that, revert the settings to always ON. Without the firewall, your PC is 100% prone to getting stuck with a virus or malware. 

Step 1 – Press Win+R to Open the Run search.
Step 2 – In the search box, use the command Firewall.cpl

type command firewall.cp

Step 3 – From the opened window, check the status of the Firewall and make sure that both your network and PC are protected.

windows firewall option

If they appear to be in red, enable them instantly to avoid any errors. 

Fix 2 – Use Systweak VPN for Protection

Hackers use your location to map you and target your PC. However, even when you are connected to a regular network and have spoofed your IP to appear from any other place, it will not appear on a hacker’s radar. To achieve this, a VPN can be used. But which VPN to use? The answer is Systweak VPN. It has 200+ country servers that allow you to disguise yourself online without showing your location to anyone.  ( Read Complete Review )

Step 1 – Download the Systweak VPN. 

Step 2 – Sign in/Sign up using your credentials.

systweak vpn

Step 3 – Choose a server, preferably of a different country.

systweak vpn country

Step 4 – Browse untraced internet.

If you are not on the radar, you cannot be attacked; it’s as simple as that!

Fix 3 – Check Your Running Services

If you feel that the infiltration has already taken place, we advise you to check the services currently running on your PC. It is OK if you have accidentally allowed a request as long as you realize it soon. All you have to do is – 

Step 1 – Press Win+R to open the Run search.
Step 2 – Use the command Services. msc in the search box.type services msc command

Step 3 – From the services box, select the currency running services that you find suspicious.

currently running services

Step 4 – Shut down the service to get rid of it completely 

After closing the services, restart your PC and ensure that the service does not appear again on your computer. That way, you can be sure the issue has not reached your PC. If, by chance, there is a service that keeps appearing repeatedly, you should use your antivirus program to scan your PC and check for malware. 

Keeping your PC updated with the latest build updates and versions is always a good idea, as hackers usually target older PCs.

If you have any difficulty in finishing the steps above, you are welcome to drop us a line in the comments, and we will help you out! The Incoming requests through Bluetooth/Wi-Fi are quite dangerous, considering they usually carry Fileless malware. We advise you to avoid keeping the Wi-Fi and Bluetooth ON even when you are not using them. If you use your Wi-Fi with a local public network, you should look for a VPN to encrypt your data. 

That will be all for this one, catch you later! Stay Safe.

Recommended : 

Unblock Websites on Chrome Browser With these 4 Ways

Share On :

About The Author

Dishank Sharma
Dishank Sharma

A creative tech-writer who loves to explore latest tech-trends & convey them to his readers in the simplest way possible. He loves to blend the crispness of technology with a pinch of creativity while curating best practices for the readers. In his free time, he likes to scribble poetry, listen to rap & travel.

Related Posts

Leave a comment

Your email address will not be published. Required fields are marked *

Seen on

View All