False friends: Phagocytes as Trojan horses in microbial brain infections
نویسندگان
چکیده
Humans are constantly exposed to pathogenic microbes. The first line of cellular host defense is composed of “professional” phagocytes, cells that efficiently recognize pathogens, internalize them, and then marshal an array of antimicrobial mechanisms to destroy them. Nevertheless, successful pathogens evade or survive such attack. A particularly subversive strategy is to manipulate normal phagocyte behaviors to benefit the microbe, sometimes even turning the phagocyte from a threat to a safe haven. In this environment, the microbes can multiply while protected from immune surveillance, and in some cases, even travel to the most protected host site, the brain. This gives rise to the Trojan horse analogy: like the wooden horse that carried hidden enemies through the gates into the walled city of Troy, phagocytes carry intracellular microbes through the blood–brain barrier (BBB) into the central nervous system (CNS).
منابع مشابه
Trojan Horse Transit Contributes to Blood-Brain Barrier Crossing of a Eukaryotic Pathogen
The blood-brain barrier (BBB) protects the central nervous system (CNS) by restricting the passage of molecules and microorganisms. Despite this barrier, however, the fungal pathogen Cryptococcus neoformans invades the brain, causing a meningoencephalitis that is estimated to kill over 600,000 people annually. Cryptococcal infection begins in the lung, and experimental evidence suggests that ho...
متن کاملThe Ly-6Chigh monocyte subpopulation transports Listeria monocytogenes into the brain during systemic infection of mice.
Mononuclear phagocytes can be used by intracellular pathogens to disseminate throughout the host. In the bloodstream these cells are generically referred to as monocytes. However, blood monocytes are a heterogeneous population, and the exact identity of the leukocyte(s) relevant for microbial spreading is not known. Experiments reported in this study used Listeria monocytogenes-infected mice to...
متن کاملSecure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کاملEvent-Based Method for Detecting Trojan Horses in Mobile Devices
Mobile phones and wireless technology and its constant evolution have, in the last years, revolutionized the way in which we communicate and work. However, one of the main barriers encounter in the use of these technologies is data security. Trojan horses are dangerous software to attack phones, PDAs and Smartphones. New versions are created everyday to attack the functionality, theft the store...
متن کاملSevere Listeria monocytogenes infection induces development of monocytes with distinct phenotypic and functional features.
Monocytes perform diverse roles during infection with the facultative intracellular bacterium Listeria monocytogenes. They are essential as bactericidal cells in host defense but can also become Trojan horses transporting bacteria into the brain. To explain these contrasting roles, we characterized bone marrow (BM) monocytes in steady state and generated during lethal and sublethal L. monocytog...
متن کامل