logo
Microsoft introduces fresh Windows 11 update to help laptops last longer on battery

Microsoft introduces fresh Windows 11 update to help laptops last longer on battery

Mint6 days ago
Microsoft has announced a new Windows 11 update that helps laptops run longer without needing a charger. This update is part of ongoing efforts to make devices adjust better to your daily habits and keep them powered up when you need them most. As part of this release, a new adaptive energy saver mode will automatically turn the main energy saver on or off. It looks at your laptop's workload instead of only checking how much battery is left.
For example, if you are browsing a website or reading a document it will quietly enable energy mode to slow down the background processes and reduce screen brightness. When you start editing video or using intensive applications, the system shifts back to full power mode without needing to change any settings.
Energy saver mode in Windows 11 typically dims the display brightness by 30%. It turns off transparency effects and stops apps from running in the background. Windows updates, and apps like OneDrive, OneNote, and Phone Link might not sync completely while energy saver is on.
Microsoft says that their goal is to make the battery saver feel invisible but still effective. The company explains that it wants users to spend less time adjusting battery settings and more time focusing on their work. Many people forget to enable battery saving options until their laptops are already warning them about low charge status. This adaptive approach aims to remove that step altogether.
The new adaptive energy saver mode will work only on devices with a battery. It won't change your laptop's screen brightness when it turns on or off, making it less noticeable on laptops, tablets, and handhelds.
Soon you will be able to see more precise battery estimates and track which apps are using the most battery. This will help you spot issues like background apps draining more energy than expected. For example, if you leave multiple tabs open or videos playing in the background, the dashboard will show how much battery those habits use, so you can decide what to close.
Windows 11 update also adds smarter controls for screen refresh rates and brightness. When you step away, your system will lower its refresh rate automatically and return to normal when you come back. This helps save power during everyday use. The update is now rolling out in the latest Windows 11 release. You can check Windows Update in your settings to see if it's ready for your laptop.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Microsoft issues urgent patch as SharePoint exploit spreads globally: How to stay safe online
Microsoft issues urgent patch as SharePoint exploit spreads globally: How to stay safe online

Mint

time12 minutes ago

  • Mint

Microsoft issues urgent patch as SharePoint exploit spreads globally: How to stay safe online

A widespread cyberattack targeting Microsoft SharePoint server software has raised alarms among security agencies and businesses worldwide, with experts suggesting that a single threat actor may be behind the coordinated assault. Over the weekend, Microsoft issued a critical security alert warning of 'active attacks' on on-premise SharePoint servers, widely used by organisations and government bodies to manage and share internal documents. Notably, the tech giant clarified that SharePoint Online, part of its Microsoft 365 cloud suite, was not affected by the exploit, which is being classified as a "zero-day" vulnerability, meaning it was previously unknown to cybersecurity professionals. Rafe Pilling, Director of Threat Intelligence at British cybersecurity firm Sophos, indicated that evidence pointed towards a single entity executing the campaign. 'Based on the consistency of the tradecraft seen across observed attacks, the campaign launched on Friday appears to be a single actor. However, it is possible that this will quickly change,' Pilling noted. He highlighted the use of identical digital payloads across various targets as a significant indicator of a singular source. While Microsoft confirmed that it had released security updates to address the flaw, the company urged users to install the patches without delay. However, cybersecurity experts caution that remediation may require more than just patch deployment. Daniel Card, of the UK-based consultancy PwnDefend, warned that the scope of the attack suggested a broad level of compromise. 'The SharePoint incident appears to have created a broad level of compromise across a range of servers globally. Taking an assumed breach approach is wise, and it is also important to understand that just applying the patch is not all that is required here,' he said. According to Shodan, a search engine that indexes internet-connected devices, over 8,000 SharePoint servers currently accessible online may have already been exposed to the exploit. These include systems belonging to prominent industrial companies, financial institutions, healthcare providers, auditors, and multiple U.S. state and international government organisations. The identity of the attacker remains unknown. Moreover, the US Federal Bureau of Investigation (FBI) acknowledged the incident on Sunday, stating that it was working alongside both federal partners and private sector entities to assess the situation. Meanwhile, the UK's National Cyber Security Centre has yet to respond publicly. The Washington Post reported that unidentified cyber actors had recently leveraged the SharePoint vulnerability to target both American and international agencies, suggesting the campaign could have extensive geopolitical ramifications. (With inputs from Reuters)

Microsoft server hack likely single actor, thousands of firms now vulnerable, researchers say
Microsoft server hack likely single actor, thousands of firms now vulnerable, researchers say

Mint

time41 minutes ago

  • Mint

Microsoft server hack likely single actor, thousands of firms now vulnerable, researchers say

Hack exploits previously unknown flaw in SharePoint software Thousands of entities potentially now vulnerable to attack Hack likely work of one threat actor or group, researcher says Unclear who is behind attacks LONDON, July 21 (Reuters) - A global attack on Microsoft server software used by thousands of government agencies and businesses to share documents within organisations is likely the work of a single actor, a cybersecurity researcher said on Monday. Microsoft on Saturday issued an alert about "active attacks" on SharePoint servers used within organisations. It said that SharePoint Online in Microsoft 365, which is in the cloud, was not hit by the exploit, also known as a "zero day" because it was previously unknown to cybersecurity researchers. "Based on the consistency of the tradecraft seen across observed attacks, the campaign launched on Friday appears to be a single actor. However, it's possible that this will quickly change," Rafe Pilling, Director of Threat Intelligence at Sophos, a British cybersecurity firm. That tradecraft included the sending of the same digital payload to multiple targets, Pilling added. Microsoft said it had "provided security updates and encourages customers to install them," a company spokesperson said in an emailed statement. It was not clear who was behind the ongoing hack. The FBI said on Sunday it was aware of the attacks and was working closely with its federal and private-sector partners, but offered no other details. Britain's National Cyber Security Centre did not immediately respond to a request for comment. The Washington Post said unidentified actors in the past few days had exploited a flaw to launch an attack that targeted U.S. and international agencies and businesses. According to data from Shodan, a search engine that helps to identify internet-linked equipment, over 8,000 servers online could theoretically have already been compromised by hackers. Those servers include major industrial firms, banks, auditors, healthcare companies, and several U.S. state-level and international government entities. "The SharePoint incident appears to have created a broad level of compromise across a range of servers globally," said Daniel Card of British cybersecurity consultancy, PwnDefend.

Explained: 10000-plus companies at risk and …, what makes the Microsoft SharePoint attack very dangerous right now
Explained: 10000-plus companies at risk and …, what makes the Microsoft SharePoint attack very dangerous right now

Time of India

timean hour ago

  • Time of India

Explained: 10000-plus companies at risk and …, what makes the Microsoft SharePoint attack very dangerous right now

Microsoft is scrambling to contain a widespread cyberattack targeting SharePoint servers worldwide, with cybersecurity experts warning that over 10,000 companies could be at risk. Tired of too many ads? go ad free now The software giant confirmed that hackers are actively exploiting previously unknown security flaws in on-premises SharePoint servers used by government agencies, universities, and major corporations to share internal documents. The Cybersecurity and Infrastructure Security Agency ( CISA ) added the vulnerability to its Known Exploited Vulnerability catalog on Saturday, giving federal agencies just one day to apply patches once they become available. "These exploits are real, in-the-wild, and pose a serious threat," warned Palo Alto Networks, while Google's Threat Intelligence Group confirmed observing active exploitation attempts. Dutch cybersecurity firm Eye Security first detected the attacks on July 18th and reports that at least 85 SharePoint servers across 54 organizations have already been compromised. Among the victims are a California university, energy companies, federal health organizations, and government entities in Florida and New York. Microsoft Sharepoint's zero-day exploits leave tens and thousands of organisations vulnerable The attack leverages what's known as a "zero-day" vulnerability – a security flaw unknown to software makers until it's actively exploited by hackers. Cybersecurity researchers estimate that over 10,000 companies with SharePoint servers are potentially at risk, with the United States, Netherlands, United Kingdom, and Canada having the highest concentrations of vulnerable systems. "It's a dream for ransomware operators, and a lot of attackers are going to be working this weekend as well," said Silas Cutler, a researcher at Michigan-based Censys. Tired of too many ads? go ad free now The vulnerability allows hackers to access file systems, steal sensitive configurations, and execute malicious code across networks without authentication. The attackers are using a technique called "ToolShell" that was originally demonstrated at the Pwn2Own security conference . They upload malicious files to steal critical server keys, then use these stolen credentials to create valid access tokens that bypass security measures entirely. Government agencies among primary targets in Microsoft Sharepoint attack Federal and state agencies appear to be prime targets in this campaign, with the FBI confirming it's "aware of the matter" and working with government and private sector partners to assess the threat. The Washington Post reported that the breach has affected multiple U.S. agencies, though specific details remain classified for security reasons. CISA's Acting Executive Assistant Director for Cybersecurity Chris Butera emphasized the urgency: "Microsoft is responding quickly, and we are working with the company to help notify potentially impacted entities about recommended mitigations. CISA encourages all organizations with on-premise Microsoft SharePoint servers to take immediate recommended action." Organizations can detect if they've been compromised by checking for suspicious files named " on their servers or unusual network activity from specific IP addresses that security firms have identified as attack sources. Microsoft releases emergency updates Microsoft has released emergency security updates for SharePoint 2019 and Subscription Edition servers, with a patch for SharePoint 2016 expected soon. The company recommends that organizations unable to immediately apply updates should disconnect their SharePoint servers from the internet until patches can be installed. For additional protection, Microsoft advises enabling its Antimalware Scan Interface (AMSI) feature and deploying Windows Defender Antivirus on all SharePoint servers. Organizations should also rotate their server security keys after applying patches to prevent further unauthorized access. This incident adds to Microsoft's recent cybersecurity challenges, including Chinese hacker attacks earlier this year and criticism from the White House's Cyber Safety Review Board, which called the company's security culture "inadequate" following previous breaches.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store