recommended reading

China Thinks Its Bird Flu Might Be Spreading from Human to Human

Women walk past a notice on bird flu at a residential area in Minhang district, south of Shanghai, China.

Women walk past a notice on bird flu at a residential area in Minhang district, south of Shanghai, China. // Eugene Hoshiko/AP

Since the first cases of the deadly H7N9 bird flu strain appeared in Shanghai earlier this month, Chinese health officials told the world not to panic because they couldn't find solid evidence of human-to-human transmission in any of what have grown into 82 reported infections. They maintained that until, well, guess what China's health experts are saying for the first time today? "Human-to-human transmission, in theory, is possible, but is highly sporadic," Feng Zijian, director of the health emergency center of the Chinese Center for Disease Control and Prevention, toldreporters in China on Thursday. "Further investigations are still under way to figure out whether the family cluster involved human-to-human transmission," Feng added.  

The "family cluster" he's talking about is a case in which two sons may have contracted bird flu from their father, an 87-year-old man thought to be the first reported case of China's H7N9 virus,according to China Daily. Perhaps even more worrisome: The World Health Organization said Wednesday that there are other humans, aside from the two brothers being investigated, who appear to have contracted the deadly virus without any contact with poultry. (Even though it's called bird flu, that's how the Contagion thing was supposed to work with the spread of H729.) "It might be because of dust at the wet markets, it could be another animal source beside poultry, it could also be human-to-human transmission," WHO spokesman Gregory Hartl told Reuters. So, to be clear, officials aren't quite sure how people who aren't handling poultry are getting this strain of bird flu. And, to be sure, that's pretty scary.

Read more at The Atlantic Wire

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.