Solid Lipid Nanoparticles Could Be Used In Gene Therapy
ScienceDaily (May 19, 2009) — Gene therapy offers hope in treating diseases such as cystic fibrosis and disorders of the retina, as well as with more common illnesses such as AIDS, cancer and neurodegenerative diseases (for example, Parkinson’s or Alzheimer’s). Now, a researcher in Spain has come up with a new approach that uses solid lipid nanoparticles to deliver therapeutic genes.
See also:
Health & Medicine
Gene Therapy
Genes
Immune System
Mind & Brain
Parkinson's
Alzheimer's
Behavior
Reference
Gene therapy
Introduction to genetics
Hormone
Tumor suppressor gene
The author of the PhD is Ms Ana del Pozo Rodríguez (Vitoria, 1980), a pharmacy graduate, who defended her thesis entitled "Development of solid lipid nanoparticles as systems for and administration in genic therapy."*
Administration of genes
Ms del Pozo’s thesis describes the development, characterisation and optimisation of a system of administration of genes based on solid lipid nanoparticles (SLNs). These particles, more or less the size of one micron and with a positive surface charge, are capable of transporting genes to the interior of the cells and enable the transport of nucleic acids — ADN or ARN — in order to be used in gene therapy. These therapies can be employed as a therapeutic tool to cure illnesses that currently only have a palliative treatment of symptoms.
The researcher studied factors related to the composition of nanoparticles that affect the capacity of transporting genes to different cells, investigating the behaviour of the particles within the cells through various microscopic techniques.
Optimisation with a peptide
In order to optimise the functioning of SLNs, these were combined with a peptide that enhances the entry of the genes into the cells — peptides are organic compounds that are found in most living tissues, and they have multiples biological functions. It is this part of the work that is being undertaken in collaboration with the IRB Group from Barcelona.
Work has also been carried out in order to improve the stability of the nanoparticles and, finally the capacity of the SNLs for transporting the genes evaluated. To this end, both in vitro and in vivo trials were undertaken — the latter through intravenous administration in mice.
Without effects for immunity
Therapies based on transporting genes to the interior of cells – using viruses – already exist. This technique is based on the natural capacity of viruses to penetrate the nucleus of a cell and so take the DNA or RNA there; however, the method can affect immunity. This is why it is necessary to develop particles with the same capacity for penetrating cells but without the side-effects on cell immunity.
*The directors of the PhD were Ms Alicia Rodríguez Gascón and Ms María Ángeles Solinís Aspiazu from the Department of Pharmacy and Food Sciences at the Pharmacy Faculty of the University of the Basque Country (UPV/EHU). In undertaking the research, the author of the thesis worked with the Ernest Giralt team at the Institut de Reserca Biomèdica in Barcelona (IRB Barcelona). Ms del Pozo Rodríguez is currently working as a researcher for CIBER-BNN at the Pharmacy and Pharmaceutical Technological Laboratory at the Pharmacy Faculty of the UPV/EHU.
Adapted from materials provided by Basque Research.
Email or share this story:
addthis_pub = 'sciencedaily';
Need to cite this story in your essay, paper, or report? Use one of the following formats:
APA MLA
Basque Research (2009, May 19). Solid Lipid Nanoparticles Could Be Used In Gene Therapy. ScienceDaily. Retrieved May 22, 2009, from http://www.sciencedaily.com /releases/2009/05/090518103225.htm
enlarge
Ana del Pozo Rodríguez, the PhD thesis author. (Credit: Ana del Pozo Rodríguez)
Ads by Google
Advertise here
Alzheimer'sSubscribe To Expert Clinical Information On Alzheimer's Diseasewww.UpToDate.com/Patients
Alzheimer's SymptomsLearn the 10 warning signs. See Alzheimer's Association checklist.www.alz.org/10signs
Alzheimer's Disease?A Clinical Trial Aimed At Slowing The Progression of Alzheimer'swww.ICARAstudy.com
Parkinson's Disease CMEFree CME with Case Study and Slides From Experts in Movement Disorderswww.ParkinsonsDiseaseCME.com
Powerful Immune SupportThe Original Del-Immune V Probiotic-based, recommended by MDsdelimmune.com
Related Stories
Targeted Nanoparticles Incorporating SiRNA Offer Promise For Cancer Treatment (May 21, 2007) — The use of targeted nanoparticles offers promising techniques for cancer treatment. Researchers have been using small interfering RNA (siRNA), sometimes known as silencing RNA, to "silence" specific ... > read more
Moving Gene Therapy Forward With Mobile DNA (May 9, 2009) — Researchers have developed a new non-viral gene technology approach. This approach overcomes side-effects associated with the current viral vectors, such as inflammation or the development of cancer. ... > read more
Safer Gene Therapy? Hope For Parkinson's, Alzheimer's, and MS (Oct. 27, 2007) — It is possible to sustain therapeutic gene expression in the central nervous system for up to a year, even in the presence of an anti-viral immune response mechanism that is normally present in ... > read more
Dual Gene Therapy Suppresses Lung Cancer In Preclinical Test (Jan. 15, 2007) — Combination gene therapy delivered in lipid-based nanoparticles drastically reduces the number and size of human non-small cell lung cancer tumors in mice, researchers at The University of Texas M. ... > read more
Clearer Day For Gene Therapy: New Vector Carries Big Genes Linked To Inherited Blindness (Apr. 19, 2008) — For some inherited diseases, one barrier to successful gene therapy is that a commonly used vector (package into which the curative gene is placed) cannot accommodate the large size of the curative ... > read more
Phreaking
Phreaking is a slang term coined to describe the activity of a subculture of people who study, experiment with, or explore telecommunication systems, like equipment and systems connected to public telephone networks. The term "phreak" is derived from the words "phone" and "freak". It may also refer to the use of various audio frequencies to manipulate a phone system. "Phreak", "phreaker", or "phone phreak" are names used for and by individuals who participate in phreaking. Additionally, it is often associated with computer hacking. This is sometimes called the H/P culture (with H standing for Hacking and P standing for Phreaking). information on this site is for educational purposes only! Wyretap Network ©2007 - 2010
Disclaimer: The information on this site is for educational and entertainment purposes only. It is not intended to encourage or teach you to break the law, that's what TV is for, albeit in a very flawed manner. The owner(s) of this website will not be held liable for anything you choose to do with the information contained on this site. If you want to learn how to rape, murder, loot, and commit acts of terror on a monumental scale, well, you won't find it here. Instead, tune-in to your nightly news and take a lesson from your 'elected' 'leaders'.
Disclaimer: The information on this site is for educational and entertainment purposes only. It is not intended to encourage or teach you to break the law, that's what TV is for, albeit in a very flawed manner. The owner(s) of this website will not be held liable for anything you choose to do with the information contained on this site. If you want to learn how to rape, murder, loot, and commit acts of terror on a monumental scale, well, you won't find it here. Instead, tune-in to your nightly news and take a lesson from your 'elected' 'leaders'.
Social engineering techniques and terms
All social engineering techniques are based on specific attributes of human decision-making known as cognitive biases.[1] These biases, sometimes called "bugs in the human hardware," are exploited in various combinations to create attack techniques, some of which are listed here:
Pretexting
Pretexting is the act of creating and using an invented scenario (the pretext) to persuade a targeted victim to release information or perform an action and is typically done over the telephone. It is more than a simple lie as it most often involves some prior research or set up and the use of pieces of known information (e.g. for impersonation: date of birth, Social Security Number, last bill amount) to establish legitimacy in the mind of the target. [2]
This technique is often used to trick a business into disclosing customer information, and is used by private investigators to obtain telephone records, utility records, banking records and other information directly from junior company service representatives. The information can then be used to establish even greater legitimacy under tougher questioning with a manager (e.g., to make account changes, get specific balances, etc).
As most U.S. companies still authenticate a client by asking only for a Social Security Number, date of birth, or mother's maiden name, the method is effective in many situations and will likely continue to be a security problem in the future.
Pretexting can also be used to impersonate co-workers, police, bank, tax authorities, or insurance investigators — or any other individual who could have perceived authority or right-to-know in the mind of the targeted victim. The pretexter must simply prepare answers to questions that might be asked by the victim. In some cases all that is needed is a voice that sounds authoritative, an earnest tone, and an ability to think on one's feet.
Phishing
Main article: Phishing
Phishing is a technique of fraudulently obtaining private information. Typically, the phisher sends an e-mail that appears to come from a legitimate business—a bank, or credit card company—requesting "verification" of information and warning of some dire consequence if it is not provided. The e-mail usually contains a link to a fraudulent web page that seems legitimate—with company logos and content—and has a form requesting everything from a home address to an ATM card's PIN.
For example, 2003 saw the proliferation of a phishing scam in which users received e-mails supposedly from eBay claiming that the user’s account was about to be suspended unless a link provided was clicked to update a credit card (information that the genuine eBay already had). Because it is relatively simple to make a Web site resemble a legitimate organization's site by mimicking the HTML code, the scam counted on people being tricked into thinking they were being contacted by eBay and subsequently, were going to eBay’s site to update their account information. By spamming large groups of people, the “phisher” counted on the e-mail being read by a percentage of people who already had listed credit card numbers with eBay legitimately, who might respond.
IVR or phone phishing
This technique uses a rogue Interactive voice response (IVR) system to recreate a legitimate sounding copy of a bank or other institution's IVR system. The victim is prompted (typically via a phishing e-mail) to call in to the "bank" via a (ideally toll free) number provided in order to "verify" information. A typical system will reject log-ins continually, ensuring the victim enters PINs or passwords multiple times, often disclosing several different passwords. More advanced systems transfer the victim to the attacker posing as a customer service agent for further questioning.
One could even record the typical commands ("Press one to change your password, press two to speak to customer service" ...) and play back the direction manually in real time, giving the appearance of being an IVR without the expense.
The technical name for phone phishing, is vishing.
Baiting
Baiting is like the real-world Trojan Horse that uses physical media and relies on the curiosity or greed of the victim.[3]
In this attack, the attacker leaves a malware infected floppy disk, CD ROM, or USB flash drive in a location sure to be found (bathroom, elevator, sidewalk, parking lot), gives it a legitimate looking and curiosity-piquing label, and simply waits for the victim to use the device.
For example, an attacker might create a disk featuring a corporate logo, readily available off the target's web site, and write "Executive Salary Summary Q2 2009" on the front. The attacker would then leave the disk on the floor of an elevator or somewhere in the lobby of the targeted company. An unknowing employee might find it and subsequently insert the disk into a computer to satisfy their curiosity, or a good samaritan might find it and turn it in to the company.
In either case as a consequence of merely inserting the disk into a computer to see the contents, the user would unknowingly install malware on it, likely giving an attacker unfettered access to the victim's PC and perhaps, the targeted company's internal computer network.
Unless computer controls block the infection, PCs set to "auto-run" inserted media may be compromised as soon as a rogue disk is inserted.
Quid pro quo
Quid pro quo means something for something:
An attacker calls random numbers at a company claiming to be calling back from technical support. Eventually they will hit someone with a legitimate problem, grateful that someone is calling back to help them. The attacker will "help" solve the problem and in the process have the user type commands that give the attacker access or launch malware.
In a 2003 information security survey, 90% of office workers gave researchers what they claimed was their password in answer to a survey question in exchange for a cheap pen.[4] Similar surveys in later years obtained similar results using chocolates and other cheap lures, although they made no attempt to validate the passwords.[5]
Other types
Common confidence tricksters or fraudsters also could be considered "social engineers" in the wider sense, in that they deliberately deceive and manipulate people, exploiting human weaknesses to obtain personal benefit. They may, for example, use social engineering techniques as part of an IT fraud.
The latest type of social engineering techniques include spoofing or hacking IDs of people having popular e-mail IDs such as Yahoo!, GMail, Hotmail, etc. Among the many motivations for deception are:
Phishing credit-card account numbers and their passwords.
Hacking private e-mails and chat histories, and manipulating them by using common editing techniques before using them to extort money and creating distrust among individuals.
Hacking websites of companies or organizations and destroying their reputation.
Pretexting
Pretexting is the act of creating and using an invented scenario (the pretext) to persuade a targeted victim to release information or perform an action and is typically done over the telephone. It is more than a simple lie as it most often involves some prior research or set up and the use of pieces of known information (e.g. for impersonation: date of birth, Social Security Number, last bill amount) to establish legitimacy in the mind of the target. [2]
This technique is often used to trick a business into disclosing customer information, and is used by private investigators to obtain telephone records, utility records, banking records and other information directly from junior company service representatives. The information can then be used to establish even greater legitimacy under tougher questioning with a manager (e.g., to make account changes, get specific balances, etc).
As most U.S. companies still authenticate a client by asking only for a Social Security Number, date of birth, or mother's maiden name, the method is effective in many situations and will likely continue to be a security problem in the future.
Pretexting can also be used to impersonate co-workers, police, bank, tax authorities, or insurance investigators — or any other individual who could have perceived authority or right-to-know in the mind of the targeted victim. The pretexter must simply prepare answers to questions that might be asked by the victim. In some cases all that is needed is a voice that sounds authoritative, an earnest tone, and an ability to think on one's feet.
Phishing
Main article: Phishing
Phishing is a technique of fraudulently obtaining private information. Typically, the phisher sends an e-mail that appears to come from a legitimate business—a bank, or credit card company—requesting "verification" of information and warning of some dire consequence if it is not provided. The e-mail usually contains a link to a fraudulent web page that seems legitimate—with company logos and content—and has a form requesting everything from a home address to an ATM card's PIN.
For example, 2003 saw the proliferation of a phishing scam in which users received e-mails supposedly from eBay claiming that the user’s account was about to be suspended unless a link provided was clicked to update a credit card (information that the genuine eBay already had). Because it is relatively simple to make a Web site resemble a legitimate organization's site by mimicking the HTML code, the scam counted on people being tricked into thinking they were being contacted by eBay and subsequently, were going to eBay’s site to update their account information. By spamming large groups of people, the “phisher” counted on the e-mail being read by a percentage of people who already had listed credit card numbers with eBay legitimately, who might respond.
IVR or phone phishing
This technique uses a rogue Interactive voice response (IVR) system to recreate a legitimate sounding copy of a bank or other institution's IVR system. The victim is prompted (typically via a phishing e-mail) to call in to the "bank" via a (ideally toll free) number provided in order to "verify" information. A typical system will reject log-ins continually, ensuring the victim enters PINs or passwords multiple times, often disclosing several different passwords. More advanced systems transfer the victim to the attacker posing as a customer service agent for further questioning.
One could even record the typical commands ("Press one to change your password, press two to speak to customer service" ...) and play back the direction manually in real time, giving the appearance of being an IVR without the expense.
The technical name for phone phishing, is vishing.
Baiting
Baiting is like the real-world Trojan Horse that uses physical media and relies on the curiosity or greed of the victim.[3]
In this attack, the attacker leaves a malware infected floppy disk, CD ROM, or USB flash drive in a location sure to be found (bathroom, elevator, sidewalk, parking lot), gives it a legitimate looking and curiosity-piquing label, and simply waits for the victim to use the device.
For example, an attacker might create a disk featuring a corporate logo, readily available off the target's web site, and write "Executive Salary Summary Q2 2009" on the front. The attacker would then leave the disk on the floor of an elevator or somewhere in the lobby of the targeted company. An unknowing employee might find it and subsequently insert the disk into a computer to satisfy their curiosity, or a good samaritan might find it and turn it in to the company.
In either case as a consequence of merely inserting the disk into a computer to see the contents, the user would unknowingly install malware on it, likely giving an attacker unfettered access to the victim's PC and perhaps, the targeted company's internal computer network.
Unless computer controls block the infection, PCs set to "auto-run" inserted media may be compromised as soon as a rogue disk is inserted.
Quid pro quo
Quid pro quo means something for something:
An attacker calls random numbers at a company claiming to be calling back from technical support. Eventually they will hit someone with a legitimate problem, grateful that someone is calling back to help them. The attacker will "help" solve the problem and in the process have the user type commands that give the attacker access or launch malware.
In a 2003 information security survey, 90% of office workers gave researchers what they claimed was their password in answer to a survey question in exchange for a cheap pen.[4] Similar surveys in later years obtained similar results using chocolates and other cheap lures, although they made no attempt to validate the passwords.[5]
Other types
Common confidence tricksters or fraudsters also could be considered "social engineers" in the wider sense, in that they deliberately deceive and manipulate people, exploiting human weaknesses to obtain personal benefit. They may, for example, use social engineering techniques as part of an IT fraud.
The latest type of social engineering techniques include spoofing or hacking IDs of people having popular e-mail IDs such as Yahoo!, GMail, Hotmail, etc. Among the many motivations for deception are:
Phishing credit-card account numbers and their passwords.
Hacking private e-mails and chat histories, and manipulating them by using common editing techniques before using them to extort money and creating distrust among individuals.
Hacking websites of companies or organizations and destroying their reputation.
Friday, May 22, 2009
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment