News Gist .News

Articles | Politics | Finance | Stocks | Crypto | AI | Technology | Science | Gaming | PC Hardware | Laptops | Smartphones | Archive

How to Use Windows 11 Pro to Create an Encrypted Virtual Drive

Windows 11 Pro allows users to create a secure virtual drive using the Virtual Hard Drive (VHD) feature and encrypt it with BitLocker, ensuring that sensitive data is protected from cyber threats. The process involves initializing the virtual drive, assigning it a volume, and activating BitLocker to set a password and recovery key. Once set up, users can easily copy data to the encrypted drive and manage access by ejecting it when not in use.

See Also

Run Windows 11 on Raspberry Pi 5 with Botspot Virtual Machine Δ1.69

The Botspot Virtual Machine (BVM) enables users to install Windows 11 on a Raspberry Pi 5 with a simplified installation process, including both terminal commands and a GUI option. While the performance may not match that of running Windows 11 directly on hardware, it provides adequate functionality for older games and basic applications. Users can also take advantage of USB passthrough and file sharing between the host OS and the Windows 11 VM for enhanced usability.

Securely Erasing Your Digital Footprint with a Data Shredder Stick Δ1.67

A data shredder stick is the easiest and most secure way to wipe your old laptop's contents, providing peace of mind when selling or recycling it. This Windows-friendly tool overwrites data, making it impossible to recover once done, giving users greater control over their digital legacy. By using a data shredder stick, individuals can ensure their personal information and files are protected from falling into the wrong hands.

Microsoft Discoveries Vulnerable Software Attack. Δ1.66

Microsoft has confirmed that its Windows drivers and software are being exploited by hackers through zero-day attacks, allowing them to escalate privileges and potentially drop ransomware on affected machines. The company patched five flaws in a kernel-level driver for Paragon Partition Manager, which were apparently found in BioNTdrv.sys, a piece of software used by the partition manager. Users are urged to apply updates as soon as possible to secure their systems.

Avoid Unexpected Credit Card Charges With My Ultimate Online Shopping Hack Δ1.66

Using virtual cards can significantly enhance online shopping security by allowing consumers to manage their spending and limit exposure to fraud. Services like Privacy.com enable users to create virtual card numbers with specific spending limits, making it easier to handle subscriptions and free trials without the risk of unexpected charges. This method not only protects personal financial information but also offers peace of mind when dealing with unfamiliar vendors.

5 Ways to Add Laptop Storage — Without Installing a New SSD Δ1.66

Expanding a laptop's storage can be achieved through various methods without the need for an internal SSD upgrade. Options such as using SD or microSD cards, USB flash drives, external drives, network-attached storage (NAS), and cloud storage provide flexibility for users facing storage limitations. Each method has its own advantages and trade-offs, allowing users to choose the best solution based on their specific needs and usage patterns.

Threat Posed by New VMware Hyperjacking Vulnerabilities Is Hard to Overstate Δ1.65

A recently discovered trio of vulnerabilities in VMware's virtual machine products can grant hackers unprecedented access to sensitive environments, putting entire networks at risk. If exploited, these vulnerabilities could allow a threat actor to escape the confines of one compromised virtual machine and access multiple customers' isolated environments, effectively breaking all security boundaries. The severity of this attack is compounded by the fact that VMware warned it has evidence suggesting the vulnerabilities are already being actively exploited in the wild.

5 Easy Browser Tweaks That Secure Your Web Surfing Δ1.65

Modern web browsers offer several built-in settings that can significantly enhance data security and privacy while online. Key adjustments, such as enabling two-factor authentication, disabling the saving of sensitive data, and using encrypted DNS requests, can help users safeguard their personal information from potential threats. Additionally, leveraging the Tor network with specific configurations can further anonymize web browsing, although it may come with performance trade-offs.

Huge Cyberattack Found Hitting Vulnerable Microsoft-Signed Legacy Drivers to Get Past Security Δ1.65

A massive cybercriminal campaign has been discovered utilizing outdated and vulnerable Windows drivers to deploy malware against hundreds of thousands of devices. The attackers leveraged a signed driver, allowing them to disable antivirus programs and gain control over infected machines. This campaign is believed to be linked to the financially motivated group Silver Fox, which is known for its use of Chinese public cloud servers.

Hackers Stole Engineer's Password Manager Database: A Nightmare Scenario Δ1.64

A software engineer for the Disney Company unwittingly downloaded malware on his computer that turned his life upside down. The malware gave outside attackers full access to his 1Password database and session cookies, allowing them to compromise his online accounts, including his employer's Slack channel. As a result, he lost his job after Disney's forensic examination reportedly showed that he had accessed pornographic material on his work laptop in violation of company policy.

Molecular HDDs May Hold Key to Next-Gen Storage Solutions Δ1.64

Chinese researchers have developed a self-encrypting molecular storage system that uses organic molecules to store and encrypt data, with potential for ultra-high-density storage devices. The technology can operate with extremely low power consumption and perform built-in encryption using bitwise XOR operations. However, the short operational lifespan of atomic microscope tips remains a major obstacle, limiting its practicality for large-scale storage applications.

Malware Hijacks Nearly 1 Million Windows Devices in Advanced Malvertising Attack Δ1.64

A broad overview of the four stages shows that nearly 1 million Windows devices were targeted by a sophisticated "malvertising" campaign, where malware was embedded in ads on popular streaming platforms. The malicious payload was hosted on platforms like GitHub and used Discord and Dropbox to spread, with infected devices losing login credentials, cryptocurrency, and other sensitive data. The attackers exploited browser files and cloud services like OneDrive to steal valuable information.

Recovering Files in Windows 11: A Lifesaver for Accidental Deletions Δ1.64

If you’ve accidentally lost your files then here’s how to recover files in Windows 11. You have two options to recover files, so even if you have emptied your Recycle Bin (where files are temporarily stored before they are completely deleted), there are still ways to find documents you may have accidentally lost. It’s worth noting if you want to be able to recover files in Windows 11 often, then you should perform backups of your files frequently.

Seagate Hard Drive Controversy Persists as Scammers Discover Methods to Alter Reliability Metrics Δ1.64

Seagate's ongoing issues with counterfeit hard drive sales have taken a new turn, as scammers have discovered methods to manipulate Field Accessible Reliability Metrics (FARM) values, making it difficult for consumers to detect tampered devices. This latest development presents a significant challenge for Seagate and its customers, who must now find alternative ways to verify the authenticity of their purchases. The company has advised resellers to buy drives only from certified distribution partners to ensure authenticity.

UK Quietly Scrubs Encryption Advice From Government Websites Δ1.64

The U.K. government has removed recommendations for encryption tools aimed at protecting sensitive information for at-risk individuals, coinciding with demands for backdoor access to encrypted data stored on iCloud. Security expert Alec Muffet highlighted the change, noting that the National Cyber Security Centre (NCSC) no longer promotes encryption methods such as Apple's Advanced Data Protection. Instead, the NCSC now advises the use of Apple’s Lockdown Mode, which limits access to certain functionalities rather than ensuring data privacy through encryption.

Converting a USB Flash Drive Into a Portable Gaming Console for Next to Nothing Δ1.63

A lot of gamers go to great lengths to find a portable retro gaming device with the lightest and most compact kit. The Linux powered Raspberry Pi 5 does a decent job on that front, but an even smaller solution is available by turning a humble USB flash drive into a portable gaming console. This method requires setting up the open-source OS Batocera, which can be installed on the flash drive to play retro games. The process involves installing the OS, loading games into Batocera, and adjusting video settings for optimal performance.

Microsoft Teams and Other Windows Tools Hijacked to Hack Corporate Networks Δ1.63

Hackers are exploiting Microsoft Teams and other legitimate Windows tools to launch sophisticated attacks on corporate networks, employing social engineering tactics to gain access to remote desktop solutions. Once inside, they sideload flawed .DLL files that enable the installation of BackConnect, a remote access tool that allows persistent control over compromised devices. This emerging threat highlights the urgent need for businesses to enhance their cybersecurity measures, particularly through employee education and the implementation of multi-factor authentication.

Level up Your Gaming with Windows 11 Pro for Just $14.97 Δ1.63

Windows 11 Pro is offering a limited-time discount of $14.97 until March 30, allowing gamers to upgrade their performance and enjoy faster load times, enhanced visuals, and smoother gameplay. The operating system's DirectStorage feature reduces loading times by sending game data directly to the GPU, while Auto HDR enhances graphics with sharper, more vivid images. DirectX 12 Ultimate enables ray tracing and advanced rendering for a next-gen gaming experience.

Uk Will neither Confirm nor Deny that It’s Killing Encryption Δ1.63

The UK government's reported demand for Apple to create a "backdoor" into iCloud data to access encrypted information has sent shockwaves through the tech industry, highlighting the growing tension between national security concerns and individual data protections. The British government's ability to force major companies like Apple to install backdoors in their services raises questions about the limits of government overreach and the erosion of online privacy. As other governments take notice, the future of end-to-end encryption and personal data security hangs precariously in the balance.

Protecting Yourself From Vishing Attacks Surged 442% Last Year Δ1.63

Vishing attacks have skyrocketed, with CrowdStrike tracking at least six campaigns in which attackers pretended to be IT staffers to trick employees into sharing sensitive information. The security firm's 2025 Global Threat Report revealed a 442% increase in vishing attacks during the second half of 2024 compared to the first half. These attacks often use social engineering tactics, such as help desk social engineering and callback phishing, to gain remote access to computer systems.

Microsoft's Overzealous Backup Alert: A Cautionary Tale of Nudging Vs. Choice Δ1.63

Windows 11 is warning some users to back up their PCs with a banner in the Settings app, which may seem like a useful feature at first but has become bothersome for others. The nagging message is tied specifically to Microsoft's OneDrive cloud storage locker and requires users to have enough storage space, prompting them to buy more if necessary. This approach may be seen as a way to promote the backup service, but it's also an example of overreaching by Microsoft.

Microsoft's Copilot AI to Stop Helping Pirates Δ1.62

Microsoft's AI assistant Copilot will no longer provide guidance on how to activate pirated versions of Windows 11. The update aims to curb digital piracy by ensuring users are aware that it is both illegal and against Microsoft's user agreement. As a result, if asked about pirating software, Copilot now responds that it cannot assist with such actions.

Microsoft Quietly Updates Copilot to Cut Down on Unauthorized Windows Activations Δ1.62

Microsoft has implemented a patch to its Windows Copilot, preventing the AI assistant from inadvertently facilitating the activation of unlicensed copies of its operating system. The update addresses previous concerns that Copilot was recommending third-party tools and methods to bypass Microsoft's licensing system, reinforcing the importance of using legitimate software. While this move showcases Microsoft's commitment to refining its AI capabilities, unauthorized activation methods for Windows 11 remain available online, albeit no longer promoted by Copilot.

Why Local SSDs and Hard Drives Are Still Superior to the Cloud Δ1.62

Cloud storage is better, faster, and more affordable per gigabyte than ever before. However, relying solely on cloud storage can leave users vulnerable to data breaches, loss of access due to internet outages, and slower recovery times. Storing data locally on a physical drive provides greater speed, availability, and control over sensitive information. Local storage also offers security and compliance benefits, such as avoiding foreign laws and regulations that may apply to overseas data.

Microsoft Launches New Hyper-Powered Disaster Recovery Service for Cloud PCs Δ1.62

Microsoft has introduced the Windows 365 Disaster Recovery Plus (DRP) option, which significantly enhances data recovery capabilities with recovery times up to eight times quicker than the previous Cross-region Disaster Recovery (CRDR) solution. This new offering allows users to select their preferred geographic region for data sovereignty while providing access to a temporary Cloud PC during outages, although it does not preserve applications or data. The enhanced service aims to mitigate data loss risks and improve operational efficiency for organizations relying on Cloud PCs.

How to Make Microsoft Windows Services Work for You Δ1.62

Windows services operate behind the scenes and are crucial for the functionality of the operating system, although many users remain unaware of their purpose or management. Users can create, start, and stop services using tools like Daemon Master, which allows any executable program to run as a service automatically on startup. Proper management of these services is essential, as deactivating critical system services can lead to malfunctions and instability within Windows.