Skip to main content

Cellphones Don’t Cause Cancer [STUDY]


Cellphones Don’t Cause Cancer [STUDY]


A new extensive study finds no evidence to link cellphone use with cancer.
Over the past couple of years, reports have suggested that cellphones may cause cancer or claimed the opposite. However, the interesting thing about this latest study is that it’s sample size is the entire adult population of Denmark.
Researchers from Copenhagen’s Department of Epidemiology and Public Health divided Danish adults (30 years of age and over) born after 1925 into subscribers and non-subscribers of mobile phones before 1995. The study found that occurrences of cancer among the two groups were nearly equal.
Furthermore, among mobile phone subscribers, the study didn’t find an increased number of occurrences of glioma in the temporal lobes of the brain, the part of the body most directly exposed to cellphone radiation.
The study, of course isn’t without flaws — one doesn’t need to have a subscription plan to use a cellphone. The authors of the study recognized this. “Subscription holders who are not using their phone will erroneously be classified as exposed and people without a subscription but still using a mobile phone will erroneously be classified as unexposed,” the study says.
This prompted the authors to do an additional analysis of the study’s results which reduced the number of cases but also minimized the possibility for misclassification, but the results were very similar.
“In this update of a nationwide study of mobile phone subscribers in Denmark we found no indication of an increased risk of tumours of the central nervous system,” the authors conclude. However, the authors warn that “a small to moderate increase in risk for subgroups of heavy (cellphone) users” cannot be ruled out, which calls for further studies on large populations.
While every study has its flaws and limitations, this appears to be the most convincing and exhaustive report indicating that cellphones do not cause cancer.
Check out the entire study here.
Graphic courtesy iStockphoto/gerenme

Comments

Popular posts from this blog

Proxy list

* http://www.proxy4free.com * http://www.publicproxyservers.com * http://www.anonymitychecker.com * http://www.proxz.com * http://www.digitalcybersoft.com/ProxyList/ * http://www.checker.freeproxy.ru * http://tools.rosinstrument.com/proxy/ * http://www.samair.ru/proxy/ * http://www.multiproxy.org/anon_proxy.htm * http://www.atomintersoft.com/product...xy/proxy-list/ [/b]

Useful & Valuable Sites

For Urgent Blood Requirements call +91888704898 Learn online Udemy Coursera Khan Openculture W3Schools Buy online Flipkart Amazon Myntra shopclues freekaamaal Online App Ajio Craftvilla Mirraw Limeroad Voonik Travel Booking Railway Paytm Redbus goibibo Trivago Sales OLX Justdail Quikr carwale 2ndhandbazar Jobs Search Bank Jobs BJS Glassdoor LinkedIn Freelancer S/W Downloads Filehippo Softpedia Download.com SourceForge BrotherSoft Flight Booking Qatar Singapore Makeytrip goindgo Emirates Status Enquiry Passport Panind Aadhar voter PF Yoga Acupoints Acupuncture Prachina Yoga Ayurveda Learn Cloud AWS Azure IBM VMware Redhat Search Engines Google yahoo amazon dogpile aol
Top 10 Most Common Cyber Attacks Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks A denial-of-service attack overwhelms a system’s resources so that it cannot respond to service requests. A DDoS attack is also an attack on system’s resources, but it is launched from a large number of other host machines that are infected by malicious software controlled by the attacker. Unlike attacks that are designed to enable the attacker to gain or increase access, denial-of-service doesn’t provide direct benefits for attackers. For some of them, it’s enough to have the satisfaction of service denial. However, if the attacked resource belongs to a business competitor, then the benefit to the attacker may be real enough. Another purpose of a DoS attack can be to take a system offline so that a different kind of attack can be launched. One common example is session hijacking, which I’ll describe later. There are different types of DoS and DDoS attacks; the most common are ...