False friends: Phagocytes as Trojan horses in microbial brain infections

نویسندگان

  • Felipe H Santiago-Tirado
  • Tamara L Doering
چکیده

Humans are constantly exposed to pathogenic microbes. The first line of cellular host defense is composed of “professional” phagocytes, cells that efficiently recognize pathogens, internalize them, and then marshal an array of antimicrobial mechanisms to destroy them. Nevertheless, successful pathogens evade or survive such attack. A particularly subversive strategy is to manipulate normal phagocyte behaviors to benefit the microbe, sometimes even turning the phagocyte from a threat to a safe haven. In this environment, the microbes can multiply while protected from immune surveillance, and in some cases, even travel to the most protected host site, the brain. This gives rise to the Trojan horse analogy: like the wooden horse that carried hidden enemies through the gates into the walled city of Troy, phagocytes carry intracellular microbes through the blood–brain barrier (BBB) into the central nervous system (CNS).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trojan Horse Transit Contributes to Blood-Brain Barrier Crossing of a Eukaryotic Pathogen

The blood-brain barrier (BBB) protects the central nervous system (CNS) by restricting the passage of molecules and microorganisms. Despite this barrier, however, the fungal pathogen Cryptococcus neoformans invades the brain, causing a meningoencephalitis that is estimated to kill over 600,000 people annually. Cryptococcal infection begins in the lung, and experimental evidence suggests that ho...

متن کامل

The Ly-6Chigh monocyte subpopulation transports Listeria monocytogenes into the brain during systemic infection of mice.

Mononuclear phagocytes can be used by intracellular pathogens to disseminate throughout the host. In the bloodstream these cells are generically referred to as monocytes. However, blood monocytes are a heterogeneous population, and the exact identity of the leukocyte(s) relevant for microbial spreading is not known. Experiments reported in this study used Listeria monocytogenes-infected mice to...

متن کامل

Secure FPGA Design by Filling Unused Spaces

Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...

متن کامل

Event-Based Method for Detecting Trojan Horses in Mobile Devices

Mobile phones and wireless technology and its constant evolution have, in the last years, revolutionized the way in which we communicate and work. However, one of the main barriers encounter in the use of these technologies is data security. Trojan horses are dangerous software to attack phones, PDAs and Smartphones. New versions are created everyday to attack the functionality, theft the store...

متن کامل

Severe Listeria monocytogenes infection induces development of monocytes with distinct phenotypic and functional features.

Monocytes perform diverse roles during infection with the facultative intracellular bacterium Listeria monocytogenes. They are essential as bactericidal cells in host defense but can also become Trojan horses transporting bacteria into the brain. To explain these contrasting roles, we characterized bone marrow (BM) monocytes in steady state and generated during lethal and sublethal L. monocytog...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره 13  شماره 

صفحات  -

تاریخ انتشار 2017