WeeBit writes "Researchers have different ideas as to why people fail to use security measures. Some feel that regardless of what happens, users will only do the minimum required. Others believe security tasks are rejected because users consider them to be a pain. A third group maintains user education is not working. [Microsoft Research's Cormac] Herley offers a different viewpoint. He contends that user rejection of security advice is based entirely on the economics of the process." Here is Dr. Herley's paper, So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users (PDF).
The Doktors used to put those big-ass radiation pellets into your prostate. NOW they put those LITTLE-ass radiation pellets into your prostate. Better Living Thru Chemistry???
ElectricSteve writes "Researchers have been searching for a highly targeted medical treatment that attacks cancer cells but leaves healthy tissue alone. The approach taken by scientists at Washington University in St. Louis is to use 'gold nanocages' that, when injected, selectively accumulate in tumors. When the tumors are later bathed in laser light, the surrounding tissue is barely warmed, but the nanocages convert light to heat, killing the malignant cells. ... Although the tumors took up enough gold nanocages to give them a black cast, only 6 percent of the injected particles accumulated at the tumor site. They would like that number to be closer to 40 percent so that fewer particles would have to be injected. They plan to attach tailor-made ligands to the nanocages that recognize and lock onto receptors on the surface of the tumor cells. ... The scientists at WUSTL have just received a five-year, $2.1M grant from the National Cancer Institute to continue their work with photothermal therapy." Note that Gizmag features a stupid Subscribe nag that covers your screen after about a minute; sounds like a job for NoScript. Last year we discussed somewhat similar research using titanium dioxide nanoparticles to target a particular kind of brain cancer.
Lanxon writes "The law that allows the US Internet Archive to collect and preserve websites does not apply to British archivists. In fact, experts from the Archive and many other archivist institutions argue that the only way the millions of Britain's websites could be legally archived is if British law itself was amended, reports Wired in an investigation published today. Currently, archivists have to seek permission from webmasters of every single site before they are able to take snapshots and retain data."
thelamecamel writes "According to the New South Wales state government, the Sydney Morning Herald, a local newspaper, attacked the government's 'website firewall security' for two days to research a recent story. The affected government minister said that the website was accessed 3,727 times, and that this is 'akin to 3,727 attempts to pick the lock of a secure office and take highly confidential documents.' The matter has been referred to the police, who are now investigating. But how did the paper 'hack' the website? They entered the unannounced URL. Security by obscurity at its finest."
Frequent Slashdot Contributor Bennett Haselton writes in "A federal judge rules that a student can seek attorney's fees against a high school principal who suspended her for a Facebook page she made at home. Good news, but how could the school have thought they had the right to punish her for that in the first place? Posing the question not rhetorically but seriously. What is the source of society's attitudes toward the free-speech rights of 17-year-olds?"
nk497 writes "Developers looking to prove a point about the information people are sharing on social networking sites have unveiled a new tool called Please Rob Me. It hunts out tweets from people who are also using location-based services telling the world that they're out of town, and then directs the world to go rob their house. The creators of the site said: 'Don't get us wrong, we love the whole location-aware thing. The information is very interesting and can be used to create some pretty awesome applications. However, the way in which people are stimulated to participate in sharing this information is less awesome.' How long until the first actual robbery takes place?"