Enlarge (credit: Rene Schwietzke) Gene drive is both a promising and disturbing technology. It allows us to engineer a stretch of DNA that, once inserted in a specific location in an organism’s genome, will convert other versions of the gene so that they also carry the insert. Once started in a population, gene drive will […]
A new research paper says a food industry-funded group undermined China’s efforts to keep obesity rates in check.
Older adults have been found to be just as adept as younger people when it comes to recalling new information, as long as they draw what they’re trying to remember.
Problems are inherent in using genetic databases to unearth Indigenous ancestry, but efforts are underway to help Indigenous students acquire skills and knowledge that would help them move into advisory and leadership roles withing genomic research.
Enlarge (credit: Aurich Lawson / Getty Images) Back at the start of the year, a set of attacks that leveraged the speculative execution capabilities of modern high-performance processors was revealed. The attacks were named Meltdown and Spectre. Since then, numerous variants of these attacks have been devised. In tandem, a range of mitigation techniques has […]
When doctors in study reduced the amount of narcotics they prescribed after outpatient surgeries and used other options, they found patients didn’t need more.
Health experts have differing opinions on whether there’s scientific merit to banning cannabis use for weeks before people in safety-sensitive jobs report for duty.
Race and medical research have a long history together, much of it lamentable, and new genetic discoveries raise new questions about the role race should play in the future, three essays in the Journal of the American Medical Association indicate.
Enlarge (credit: Getty Images) Mobile device management (MDM) systems are often used by organizations to manage the security of employees’ devices. But security researchers have found that the interface provided by Apple to enroll Apple devices in an MDM system can also be used to potentially introduce rogue devices into those systems and gain trusted […]
A group of researchers showed how a Tesla Model S can be hacked and stolen in seconds using only $600 worth of equipment (TSLA)
Alphr Researchers from KU Leuven university in Belgium demonstrated that hackers can secretly clone the key fob of a Tesla Model S and steal the car within seconds — and with only $ 600 worth of simple computing and radio equipment, WIRED reports. The researchers brought their findings to Tesla — which rewarded them for exposing […]