Skip to main content


Recent Posts

Select Topic

Diabetics insulin-free after stem-cell transplants

Patients recently diagnosed with type 1diabetes who received transplants of their own immune stem cells were able to go without insulin injections for nearly five years after the procedure, scientists report today...

April 14, 2009 — Jordan Lite

Can mammals make eggs after birth?

Think girls are born with all the eggs they'll ever have? New research in mice suggests that long-held notion may be false.

Chinese researchers, reporting in Nature Cell Biology , say they found stem cells in the rodents' ovaries that could be nudged into becoming eggs that produced offspring...

April 14, 2009 — Jordan Lite

Battling bioterror--A new test for ricin

Scientists say they have developed a fast and supersensitive new test for ricin, a poison found in castor beans that scientists say is a prime candidate for use in bioterrorism attacks.

April 13, 2009 — Coco Ballantyne

New chemicals for ecofriendly paints and lubricants

Last week, reported on the resurrection of olestra—a chemical once touted as the great fat alt in chips and crackers that tumbled when it turned out that it triggered gastrointestinal problems in those who chomped products containing it...

April 13, 2009 — Coco Ballantyne

Icebreaker sets sail

Editor's Note: Woods Hole Oceanographic Institution oceanographer and photographer Chris Linder and science writer Helen Fields are taking part in a six-week cruise of the Bering Sea, a scientific expedition to study the effects of climate change on this polar ecosystem...

April 13, 2009 — Helen Fields

Proposed bans on BPA picking up steam

At least seven states are considering banning bisphenol A (BPA), a chemical found in baby bottles and other plastic products that U.S. federal regulators have said is safe but has been banned in Canada because of links to health problems including heart disease and diabetes...

April 13, 2009 — Jordan Lite

Hacker targets Twitter to teach the company a lesson in security

When computer programmers find security flaws in the programs they use (particularly software running on the Web), they have a choice: report the glitch to the software maker (which may ignore the warning) or find some way of publicly (and often illegally) exploiting it to make clear to the company how vulnerable its software is...

April 13, 2009 — Larry Greenemeier

Blog Index

Scroll To Top