Cryptococci at the brain gate: break and enter or use a Trojan horse?

نویسنده

  • Arturo Casadevall
چکیده

The mechanism by which Cryptococcus neoformans invades the central nervous system is fundamental for understanding pathogenesis because cryptococcosis commonly presents as meningoencephalitis. There is evidence for both direct invasion of the endothelial cells lining the brain vasculature and a "Trojan horse" mechanism whereby cryptococci enter the central nervous system after macrophage ingestion. However, in this issue of the JCI, Shi et al. use intravital microscopy to reveal that brain invasion by C. neoformans follows a capillary microembolic event. They find that after suddenly stopping in brain capillaries, cryptococci cross into the central nervous system in a process that is urease dependent, requires viability, and involves cellular deformation. This observation provides evidence for direct brain invasion by C. neoformans, but a consideration of all the currently available evidence suggests a role for both direct and phagocyte-associated invasion. Hence, the remarkable neurotropism of C. neoformans may have more than one mechanism.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Earlier Treatment and Improved Outcome in Adult Bacterial Meningitis Following Guideline Revision Promoting Prompt Lumbar Puncture.

e3110. 3. Oliveira MME, Sampaio P, Almeida-Paes R, Pais C, Gutierrez-Galhardo MC, ZancopeOliveira RM. Rapid identification of Sporothrix species by T3B fingerprinting. J Clin Microbiol 2012; 50:2159–62. 4. Gutierrez-Galhardo MC, Silva MT, Lima MA, et al. Sporothrix schenckii meningitis in AIDS during immune reconstitution syndrome. J Neurol Neurosurg Psychiatry 2010; 81:696–9. 5. Paixão AG, Gal...

متن کامل

Secure FPGA Design by Filling Unused Spaces

Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...

متن کامل

ELT: A Trojan Horse in Disguise?

Many people believe that language teaching is a neutral practice. However, this belief is not without its own opponents. To many scholars, teaching languages cannot be devoid of teaching cultural values of the target language, which tacitly aims at denigrating cultural values of the community of the learners who are learning it. The ultimate purpose of such cultural oppression, according to the...

متن کامل

Securing FPGA design using PUF-chain and exploitation of other trojan detection circuits

Recently, there have been reports of trojans being inserted at hardware. We propose a trojan detection method which uses ring oscillators to detect trojans that are inserted at gate level. We designed a trojan that bypasses the cryptohardware module when activated. We also analyze other teams trojan detection methods and compare it with our design.

متن کامل

Trojan Horse Transit Contributes to Blood-Brain Barrier Crossing of a Eukaryotic Pathogen

The blood-brain barrier (BBB) protects the central nervous system (CNS) by restricting the passage of molecules and microorganisms. Despite this barrier, however, the fungal pathogen Cryptococcus neoformans invades the brain, causing a meningoencephalitis that is estimated to kill over 600,000 people annually. Cryptococcal infection begins in the lung, and experimental evidence suggests that ho...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • The Journal of clinical investigation

دوره 120 5  شماره 

صفحات  -

تاریخ انتشار 2010