Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Medicine

65% of Cancers Caused by Bad Luck, Not Genetics or Environment 180

BarbaraHudson writes The Wall Street Journal and the CBC are reporting that about two-thirds of cancers are caused by random chance. From the WSJ: "The researchers, from the Johns Hopkins University School of Medicine in Baltimore, analyzed published scientific papers to identify the number of stem cells, and the rate of stem-cell division, among 31 tissue types, though not for breast and prostate tissue, which they excluded from the analysis. Then they compared the total number of lifetime stem-cell divisions in each tissue against a person's lifetime risk of developing cancer in that tissue in the U.S." The correlation between these parameters suggests that two-thirds of the difference in cancer risk among various tissue types can be blamed on random, or 'stochastic,' mutations in DNA occurring during stem-cell division, and only one-third on hereditary or environmental factors like smoking, the researchers conclude. 'Thus, the stochastic effects of DNA replication appear to be the major contributor to cancer in humans.'" The CBC reports: "The researchers said on Thursday random DNA mutations accumulating in various parts of the body during ordinary cell division are the prime culprits behind many cancer types. They looked at 31 cancer types and found that 22 of them, including leukemia and pancreatic, bone, testicular, ovarian and brain cancer, could be explained largely by these random mutations — essentially biological bad luck. The other nine types, including colorectal cancer, skin cancer known as basal cell carcinoma and smoking-related lung cancer, were more heavily influenced by heredity and environmental factors like risky behavior or exposure to carcinogens. Overall, they attributed 65 percent of cancer incidence to random mutations in genes that can drive cancer growth."
Privacy

New App Detects Government Stingray Cell Phone Trackers 71

HughPickens.com writes IMSI catchers, otherwise known as stingrays, are those surveillance tools that masquerade as cell towers and trick mobile phones into connecting, spewing private data in the process. Law-enforcement agencies have been using them for almost two decades, but there's never been a good way for individuals to detect them. Now Lily Hay Newman reports that SnoopSnitch scans for radio signals that indicate a transition to a stingray from a legitimate cell tower. "SnoopSnitch collects and analyzes mobile radio data to make you aware of your mobile network security and to warn you about threats like fake base stations (IMSI catchers), user tracking and over-the-air updates." say German security researchers Alex Senier, Karsten Nohl, and Tobias Engel, creators of the app which is available now only for Android. The app can't protect people's phones from connecting to stingrays in the first place, but it can at least let them know that there is surveillance happening in a given area. "There's no one set of information, taken by itself, that allows you to detect an IMSI catcher," says Nohl. "But we do stream analysis of everything that happens on your phone, and can come out with a warning if it crosses a certain threshold."

Stingrays have garnered attention since a 2011 Arizona court case in which one agent admitted in an affidavit that the tool collaterally swept up data on "innocent, non-target devices" (U.S. v. Rigmaiden). The government eventually conceded in this case that the "tracking operation was a Fourth Amendment search and seizure," meaning it required a warrant. But given that the Justice Department has continued to claim that cellphone users have no reasonable expectation of privacy over their location data, it may take a Supreme Court judgement to settle the Stingray issue countrywide.
Image

South Korean Activist To Drop "The Interview" In North Korea Using Balloons Screenshot-sm 146

Siddharth Srinivas writes Park Sang Hak, a North Korean democracy activist, said he will start dropping 100,000 DVDs and USBs with Sony's The Interview by balloon in North Korea as early as late January. He's partnering with the U.S.-based non-profit Human Rights Foundation, which is financing the making of the DVDs and USB memory sticks of the movie with Korean subtitles.
Games

Designing the Best Board Game 155

An anonymous reader writes: Twilight Struggle tops BoardGameGeek's ranking of user-rated board games, handily beating classics like Puerto Rico, Settlers of the Catan, and Risk. FiveThirtyEight has an article about the game's design, and how certain design choices can affect enjoyment. Quoting: "Gupta has a few theories about why his game has done so well. For one, it's a two-player game — the Americans vs. the Soviets. Two-player games are attractive for a couple of reasons. First, by definition, half the players win. People like winning, and are likely to replay and rate highly a game they think they have a chance to win. ... The data offers some evidence for Gupta's hypothesis. Games that support three players rate highest, with an average of 6.58. But two-player games are a close second, with an average rating of 6.55. Next closest are five-player games, which average 6.39. ... The shortest games are the lowest rated, on average. But players don't favor length without bounds. Three hours seems to be right around the point of diminishing marginal returns. Another key to the game's success is its mix of luck and skill." What design elements do you particularly enjoy or hate in board games?
Botnet

Ask Slashdot: What Should We Do About the DDoS Problem? 312

An anonymous reader writes: Distributed denial of service attacks have become a big problem. The internet protocol is designed to treat unlimited amounts of unsolicited traffic identically to important traffic from real users. While it's true DDoS attacks can be made harder by fixing traffic amplification exploits (including botnets), and smarter service front ends, there really doesn't seem to be any long term solution in the works. Does anyone know of any plans to actually try and fix the problem?

Submission + - Windows 8.1 Vulnerability Revealed in Google Database After Timeout

An anonymous reader writes: Google's security research database has after a 90 day timeout automatically undisclosed a Windows 8.1 vulnerability which Microsoft hasn't yet patched. By design the system call NtApphelpCacheControl() in ahcache.sys allows application compatibility data to be cached for quick reuse when new processes are created. A normal user can query the cache but cannot add new cached entries as the operation is restricted to administrators. This is checked in the function AhcVerifyAdminContext(). Long story short, the aforementioned function has a vulnerability where it doesn't correctly check the impersonation token of the caller to determine if the user is an administrator. It hasn't been fully verified if Windows 7 is vulnerable. For a passer-by it is also hard to tell whether Microsoft has even reviewed the issue reported by the Google researcher. The database has already one worried comment saying that automatically revealing a vulnerability just like that might be a bad idea.
China

The Coming Decline of 'Made In China' 327

retroworks writes: Adam Minter documents the move of Chinese steel mills to Africa, and speculates that China's years of incredible rates of economic growth may already be over. This one steel mill's move to Africa, by itself, increases Africa's production by two-thirds. "The officials in Hebei Province who oversee the company may have felt they had no choice. First, they undoubtedly faced political pressure to reduce their environmental impact in China: reducing production of steel, cement and glass -- all highly polluting industries, especially in developing countries -- will have a direct impact on Xi Jinping’s pollution goals. (Starting in Hebei will have the added benefit of cleaning up polluted, neighboring Beijing.) Second, Hebei may simply be at a loss as to how to scale back businesses that they recognize have become massively bloated. Officials in China’s construction-related industries clearly have too much capacity and too little demand." It's also possible that these moves will be encouraged by China's transition to clean economy, though that could be a bad thing for pollution in Africa.

Submission + - Net neutrality under threat (indiatimes.com)

darkstar019 writes: Indian government has banned websites under the pretext that ISIS is using them for anti-Indian purposes. The list includes code sharing websites like pastebin, github and sourceforge.
As of now, these websites are running fine.

Submission + - Designing The Best Board Game (fivethirtyeight.com)

An anonymous reader writes: Twilight Struggle tops BoardGameGeek's ranking of user-rated board games, handily beating classics like Puerto Rico, Settlers of the Catan, and Risk. FiveThirtyEight has an article about the game's design, and how certain design choices can affect enjoyment. Quoting: "Gupta has a few theories about why his game has done so well. For one, it’s a two-player game — the Americans vs. the Soviets. Two-player games are attractive for a couple of reasons. First, by definition, half the players win. People like winning, and are likely to replay and rate highly a game they think they have a chance to win. ... The data offers some evidence for Gupta’s hypothesis. Games that support three players rate highest, with an average of 6.58. But two-player games are a close second, with an average rating of 6.55. Next closest are five-player games, which average 6.39. ... The shortest games are the lowest rated, on average. But players don’t favor length without bounds. Three hours seems to be right around the point of diminishing marginal returns. Another key to the game’s success is its mix of luck and skill."
Science

Super-Sensitive Motion Sensor Could Be Used To Hunt For Extraterrestrial Life 38

Zothecula writes: People often state that certain planets are too hot, cold or toxic to support life. The catch, however, is that those people are really just talking about life as we know it here on Earth. By that same token, when rovers exploring other planets seek out chemical signatures associated with life forms, they're only able to identify chemicals that we know to look for. That's why Swiss scientists from the EPFL research center have created a device that identifies microscopic life based on nanoscale movements instead of chemistry (abstract).
Businesses

Pew Survey: Tech Increases Productivity, But Also Time Spent Working 82

An anonymous reader writes: A survey of American workers conducted by the Pew Research Center found that email was their most indispensable tool, topping even broad access to the internet. 46% of workers say their productivity has increased thanks to email, the internet, and cell phones, while only 7% say those technologies have caused it to decrease. While many workers say technology has created a more flexible work schedule, they also say it has increased the total amount of hours they spend working. Almost half of the surveyed employees say their employer either forbids or explicitly blocks access to certain websites at the office. How have these technologies affected your work environment?

Submission + - Pew Survey: Tech Increases Productivity, But Also Time Spent Working (pewinternet.org)

An anonymous reader writes: A survey of American workers conducted by the Pew Research Center found that email was their most indispensable tool, topping even broad access to the internet. 46% of workers say their productivity has increased thanks to email, the internet, and cell phones, while only 7% say those technologies have caused it to decrease. While many workers say technology has created a more flexible work schedule, they also say it has increased the total amount of hours they spend working. Almost half of the surveyed employees say their employer either forbids or explicitly blocks access to certain websites at the office. How have they affected your work environment?
Security

FBI Monitoring Hacking Targets For Retaliation 96

An anonymous reader writes: As high profile security breaches continue to grab headlines, little is being done visibly by the government to prevent future attacks. This is prompting some victims (and potential victims) to find creative ways to stop the hackers. The FBI is now concerned that U.S. companies and institutions are themselves breaking laws by retaliating with cyberattacks of their own. "In February 2013, U.S officials met with bank executives in New York. There, a JPMorgan official proposed that the banks hit back from offshore locations, disabling the servers from which the attacks were being launched ... Federal investigators later discovered that a third party had taken some of the servers involved in the attack offline, according to the people familiar with the situation. Based on that finding, the FBI began investigating whether any U.S. companies violated anti-hacking laws in connection with the strike on those servers, according to people familiar with the probe."

Submission + - FBI Monitoring Hacking Targets For Retaliation (latimes.com)

An anonymous reader writes: As high profile security breaches continue to hit the headlines, little is being done visibly to prevent future attacks. This is prompting some victims (and potential victims) to find creative ways to stop the hackers. The FBI is now concerned that U.S. companies and institutions are themselves breaking laws by retaliating with cyberattacks of their own. "In February 2013, U.S officials met with bank executives in New York. There, a JPMorgan official proposed that the banks hit back from offshore locations, disabling the servers from which the attacks were being launched ... Federal investigators later discovered that a third party had taken some of the servers involved in the attack offline, according to the people familiar with the situation. Based on that finding, the FBI began investigating whether any U.S. companies violated anti-hacking laws in connection with the strike on those servers, according to people familiar with the probe."
Privacy

Doppler Radar Used By Police To Determine Home Occupancy 139

schwit1 sends an article by Orin Kerr about a court case where a judge has had to weigh Fourth Amendment protections against law enforcement's ability to use a Doppler radar device to tell whether people are present within a home. Kerr writes: If the government has the burden of proving reasonable suspicion, should the court treat the absence of information in the record on this point as not changing its otherwise-reached view that there is reasonable suspicion (as it does), or should that be treated as a potentially serious deficiency in getting to reasonable suspicion that the government has to overcome? I’m not sure of the answer. We don’t normally encounter this question because we normally understand the uses and limits of investigatory tools. If the officer looked through the window and didn’t see any other people, for example, we could intuitively factor that into the reasonable suspicion inquiry without having to think about burdens of proof. I’m less sure what we’re supposed to do when the government use a suspicion-testing technological device with unknown capabilities." The judge in the court case wrote, "New technologies bring with them not only new opportunities for law enforcement to catch criminals but also new risks for abuse and new ways to invade constitutional rights (PDF). ... Unlawful searches can give rise not only to civil claims but may require the suppression of evidence in criminal proceedings. We have little doubt that the radar device deployed here will soon generate many questions for this court and others along both of these axes."

Slashdot Top Deals

HELP!!!! I'm being held prisoner in /usr/games/lib!

Working...