Feeds

Sixth of Britain's cellphones have traces of poo on them

Playing Angry Birds on the loo: There are consequences

Providing a secure and efficient Helpdesk

One in every six mobiles in the UK has got traces of poo on it, according to a new study.

Scientists from the London School of Hygiene & Tropical Medicine (LSHTM) and Queen Mary, University of London, found that mobes were typically contaminated with faecal matter because people still didn't wash their hands properly with soap after going to the loo. (Or it could also be because people can't resist tweeting and playing Angry Birds while they're in the middle of a particularly stubborn bowel movement.)

The study, released ahead of Global Handwashing Day held on 15 October, also showed that the British tend to lie about their hygiene habits.

"Although 95 per cent of people said they washed their hands with soap where possible, 92 per cent of phones and 82 per cent of hands had bacteria on them. Worryingly, 16 per cent of hands and 16 per cent of phones were found to harbour E coli – bacteria of a faecal origin," the study's canned statement said.

Researchers travelled to 12 cities in the UK to take samples and ask questions. They found that Brummies had the most contaminated phones, with 41 per cent of them carrying E coli, but the dirtiest hands were found on 28 per cent of Londoners.

"This study provides more evidence that some people still don't wash their hands properly, especially after going to the toilet," Dr Val Curtis from LSHTM said in the statement.

"I hope the thought of having E coli on their hands and phones encourages them to take more care in the bathroom - washing your hands with soap is such a simple thing to do but there is no doubt it saves lives."

Faecal bacteria can survive on people's hands and on surfaces for hours at a time, especially in warmer temperatures away from sunlight, and it's also easily transferable.

While E coli can result in nothing more than a mild stomach upset, it's also linked to fatal cases of food poisoning. Such an outbreak occurred in Germany last June, for instance. ®

Internet Security Threat Report 2014

More from The Register

next story
MARS NEEDS WOMEN, claims NASA pseudo 'naut: They eat less
'Some might find this idea offensive' boffin admits
SECRET U.S. 'SPACE WARPLANE' set to return from SPY MISSION
Robot minishuttle X-37B returns after almost 2 years in orbit
LOHAN crash lands on CNN
Overflies Die Welt en route to lively US news vid
Experts brand LOHAN's squeaky-clean box
Phytosanitary treatment renders Vulture 2 crate fit for export
You can crunch it all you like, but the answer is NOT always in the data
Hear that, 'data journalists'? Our analytics prof holds forth
No sail: NASA spikes Sunjammer
'Solar sail' demonstrator project binned
America's super-secret X-37B plane returns to Earth after nearly TWO YEARS aloft
674 days in space for US Air Force's mystery orbital vehicle
Carry On Cosmonaut: Willful Child is a poor taste Star Trek parody
Cringeworthy, crude and crass jokes abound in Steven Erikson’s sci-fi debut
Origins of SEXUAL INTERCOURSE fished out of SCOTTISH LAKE
Fossil find proves it first happened 385 million years ago
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.