About the Author admin


news

Insight into development of lung cancer

Lung cancer results from effects of smoking along with multiple genetic components. A new study identifies two main pathways for the role of chromosome 15q25.1 — a leader in increasing susceptibility to lung cancer — in modifying disease risk. One pathway is implicated in nicotine dependence. The other plays a part in biological processes such as nutrient transfer and immune system function. The findings increase our understanding of lung cancer cause and development.

Read more 0 Comments
news

Can the police search your phone?

Can the police search your phone?
The answer to that question is getting complicated.
But it’s an important thing to know. The reason is that your phone, and the phones of every employee at your company, almost certainly contain company secrets — or provide access to those secrets.
Phones can provide access to passwords, contact lists, emails, phone call metadata, photos, spreadsheets and other company documents, location histories, photos and much more.
[ Related: The paranoid Android traveler’s data-protection checklist ] Proprietary data — including information that would enable systematic hacking of company servers for sabotage, industrial espionage and worse — is protected from legal exposure by a complex set of well-understood laws and norms in the United States. But that same data is accessible from company phones.
To read this article in full, please click here

Read more 0 Comments
news

Can the police search your phone?

Can the police search your phone?
The answer to that question is getting complicated.
But it’s an important thing to know. The reason is that your phone, and the phones of every employee at your company, almost certainly contain company secrets — or provide access to those secrets.
Phones can provide access to passwords, contact lists, emails, phone call metadata, photos, spreadsheets and other company documents, location histories, photos and much more.
[ Related: The paranoid Android traveler’s data-protection checklist ] Proprietary data — including information that would enable systematic hacking of company servers for sabotage, industrial espionage and worse — is protected from legal exposure by a complex set of well-understood laws and norms in the United States. But that same data is accessible from company phones.
To read this article in full, please click here

Read more 0 Comments