Cryptococci at the brain gate: break and enter or use a Trojan horse?
نویسنده
چکیده
The mechanism by which Cryptococcus neoformans invades the central nervous system is fundamental for understanding pathogenesis because cryptococcosis commonly presents as meningoencephalitis. There is evidence for both direct invasion of the endothelial cells lining the brain vasculature and a "Trojan horse" mechanism whereby cryptococci enter the central nervous system after macrophage ingestion. However, in this issue of the JCI, Shi et al. use intravital microscopy to reveal that brain invasion by C. neoformans follows a capillary microembolic event. They find that after suddenly stopping in brain capillaries, cryptococci cross into the central nervous system in a process that is urease dependent, requires viability, and involves cellular deformation. This observation provides evidence for direct brain invasion by C. neoformans, but a consideration of all the currently available evidence suggests a role for both direct and phagocyte-associated invasion. Hence, the remarkable neurotropism of C. neoformans may have more than one mechanism.
منابع مشابه
Earlier Treatment and Improved Outcome in Adult Bacterial Meningitis Following Guideline Revision Promoting Prompt Lumbar Puncture.
e3110. 3. Oliveira MME, Sampaio P, Almeida-Paes R, Pais C, Gutierrez-Galhardo MC, ZancopeOliveira RM. Rapid identification of Sporothrix species by T3B fingerprinting. J Clin Microbiol 2012; 50:2159–62. 4. Gutierrez-Galhardo MC, Silva MT, Lima MA, et al. Sporothrix schenckii meningitis in AIDS during immune reconstitution syndrome. J Neurol Neurosurg Psychiatry 2010; 81:696–9. 5. Paixão AG, Gal...
متن کاملSecure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کاملELT: A Trojan Horse in Disguise?
Many people believe that language teaching is a neutral practice. However, this belief is not without its own opponents. To many scholars, teaching languages cannot be devoid of teaching cultural values of the target language, which tacitly aims at denigrating cultural values of the community of the learners who are learning it. The ultimate purpose of such cultural oppression, according to the...
متن کاملSecuring FPGA design using PUF-chain and exploitation of other trojan detection circuits
Recently, there have been reports of trojans being inserted at hardware. We propose a trojan detection method which uses ring oscillators to detect trojans that are inserted at gate level. We designed a trojan that bypasses the cryptohardware module when activated. We also analyze other teams trojan detection methods and compare it with our design.
متن کاملTrojan Horse Transit Contributes to Blood-Brain Barrier Crossing of a Eukaryotic Pathogen
The blood-brain barrier (BBB) protects the central nervous system (CNS) by restricting the passage of molecules and microorganisms. Despite this barrier, however, the fungal pathogen Cryptococcus neoformans invades the brain, causing a meningoencephalitis that is estimated to kill over 600,000 people annually. Cryptococcal infection begins in the lung, and experimental evidence suggests that ho...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- The Journal of clinical investigation
دوره 120 5 شماره
صفحات -
تاریخ انتشار 2010