Links 1/31/2026 | naked capitalism

The Pursuit of Mastery Big Think Gray wolves are hunting sea otters and no one knows how Science Daily (Kevin W) Social media is boosting mental health disorders and suicidal thoughts among teens, particularly in girls The Conversation Genes influence human lifespan far more than thought, new study suggests STAT COVID-19/Pandemics 📉25% LOWER ALL-CAUSE MORTALITY! […]

9 mins read

Here are the tools you need to clean, maintain, and upgrade your laptop — from cleaning cloths and dusters to screwdrivers and drive upgrades

Laptops are convenient. You don’t have to build them – unless you want to. They can travel with you everywhere, you turn them on, and they generally just work. Most people use them until the day they die and throw them away or recycle them. But just like complex PC builds, laptops can still benefit […]

8 mins read

AMD CES 2026 gaming trends press Q&A roundtable transcript — ‘we see a little bit of an uptick in the percentage of AM4 versus AM5 platforms’

In our final CES 2026 Q&A session for Tom’s Hardware Premium, we had the opportunity to sit down with AMD in Las Vegas, Nevada, to discuss the evolving PC hardware landscape and how products like the Ryzen AI 400 might make a splash over the coming year. If you’ve not checked out our previous rounds […]

39 mins read

Grab this PC gaming bundle that pairs AMD’s Ryzen 5 7600X with fast 32GB DDR5-6000 memory and a 240mm AIO for just $414.99 — save $220 on a budget AM5 build

With limited availability and inflated memory prices due to the ongoing global DRAM shortage, we’re constantly on the lookout for deals that can actually save you money. Today, we have yet another combo bundle available from Newegg that includes a Patriot Viper Venom 32GB DDR5 6000 RAM kit along with the AMD Ryzen 5 7600X […]

3 mins read

Password Reuse in Disguise: An Often-Missed Risky Workaround

When security teams discuss credential-related risk, the focus typically falls on threats such as phishing, malware, or ransomware. These attack methods continue to evolve and rightly command attention. However, one of the most persistent and underestimated risks to organizational security remains far more ordinary. Near-identical password reuse continues to slip past security controls, often unnoticed, […]

6 mins read