Long ago, our ancestors may have become human to get away from snakes. They may have left the water in order get away from poisonous fish! There are actually more poisonous fish than poisonous snakes. Biologists have now identified 1,200 species of venomous fish (there are also over 1,500 types of poisonous lizards).

Robert Roy Britt writes in LiveScience.com that the number venomous fish tallied in the new study is six times previous estimates. More than 50,000 people are poisoned by fish bites every year, and some of them actually die from them.Poisonous fish live in all bodies of water, from streams to oceans, and at all depths. Most of them are in the tropic, although there are a few in California.
read more

The government keeps warning us about an upcoming epidemic of bird flu?which may or may not be a problem?but it doesn’t mention the current epidemic of autism, which researchers now know is caused by a genetic susceptibility to heavy metal pollution. Like detectives trying to solve a murder case, researchers searching for the biological cause of autism have come up with some surprising suspects. They’ve found that different genes may be responsible for causing autism in boys than in girls.
read more

But what is it? – Astronomers tell us that the mysterious substance called dark matter is the main substance in the universe?but we just can?t find it. It’s the same sort of thing that quantum physicists say about parallel universes or “brane worlds” (worlds that contain a different number of dimensions from ours). Astronomers can detect the presence of dark matter by the way gravity behaves around it. Now they have new evidence that it really exists.
read more

A federal judge recently ruled that it is illegal for the government to bug people’s phones in the cause of Homeland Security. But what about all that email you send? LiveScience.com reports that your keyboard can easily be bugged so that someone can “read” your passwords and other sensitive data.

Computer expert Matthew Blaze says that this bugging device, which is far more powerful than a common Trojan orrootkit, is almost impossible to detect because it works by adding nearly imperceptible processing delays after a keystroke. According to LiveScience.com, these bugs have not actually been put into use yet, but since Livescience is a spin off of the NASA web site space.com, this may not be entirely accurate.
read more