By the time Parkinson’s disease makes itself known in humans, it’s already too late for treatment. But La Trobe University in Australia has developed a test that detects a biomarker present in blood cells in folks with the disease. The school describes the test as a means of detecting problems within cell mitochondria that cause an energy-and-stress-sensing protein, dubbed AMPK, to permanently activate and start damaging cells. The research is being bankrolled in part by Parkinson’s perhaps highest-profile patient, Michael J. Fox. Well, his foundation dedicated to further research on the debilitating malady , that is. The downside is that even with Fox’s Foundation for Parkinson’s Research and the Shake It Up Australia Foundation’s $640, 000 grant to La Trobe, more money is still needed for the test to be ready for the public. And beyond that, it’d still take five years to hit the market with additional funding. For now, the school is increasing the amount of testing it’s doing, going from a group of 38 people to 70. According to The Guardian , the ultimate goal is to do a longitudinal study with “thousands” of people in their 40s prior to them being at risk for the disease and before they start showing physical symptoms. From there, the researchers could test beyond Parkinson’s and see if the same method could be used to diagnose other neurological disorders, like Alzheimer’s, as well. Via: Popular Science Source: La Trobe University
More:
Australian researchers developed a blood test for Parkinson’s
An anonymous reader writes: FinFisher, the hacker that broke into Italian firm Hacking Team, has published a step-by-step account of how he carried out the attacks, what tools he used, and what he learned from scouting HackingTeam’s network. Published on PasteBin, the attack’s timeline reveals he entered their network through a zero-day exploit in an (unnamed) embedded device, accessed a MongoDB database that had no password, discovered backups in the database, found a BES admin password in the backups, and eventually got admin access to the Windows Domain Server. From here, it was easy to reach into their email server and steal all the company’s emails, and later access Git repos and steal the source code of their surveillance software. Read more of this story at Slashdot.