Air Pollution 'Strongly Associated' With DNA Mutations Tied to Lung Cancer
A genome study has now found that outdoor smog and soot are strongly associated with DNA mutations related to lung cancer – including known drivers seen in smokers, and new ones unique to non-smokers.
The more pollution someone was exposed to, the more mutations scientists found in their lung tumors.
The findings don't mean that air pollution is directly causing lung cancer, but they do contribute to evidence suggesting that possibility.
Related:
"We're seeing this problematic trend that never-smokers are increasingly getting lung cancer, but we haven't understood why," explains biomolecular scientist Ludmil Alexandrov from the University of California San Diego (UCSD).
"Our research shows that air pollution is strongly associated with the same types of DNA mutations we typically associate with smoking."
The extensive international analysis examined the cancer genomes of 871 individuals from four continents, all of whom had lung cancer despite never having smoked and who had not yet received cancer treatment.
Those who lived in regions with high levels of air pollution were significantly more likely to have TP53 mutations, EGFR mutations, and shorter telomeres.
Abnormal TP53 and EGFR genes are hallmarks of lung cancers, especially those driven by the SBS4 DNA mutation, and shorter telomeres are linked to accelerated aging.
In the current study, non-smokers who lived in areas with higher air pollution were nearly four times more likely to exhibit SBS4 signatures as those who lived in regions with cleaner air.
By contrast, exposure to secondhand smoke, which is a known cancer risk, showed only a slight increase in genetic mutations.
"If there is a mutagenic effect of secondhand smoke, it may be too weak for our current tools to detect," says geneticist Tongwu Zhang from the US National Cancer Institute (NCI).
Not so for air pollution or tobacco smoking: both were strongly linked to DNA mutations.
Today in the United States, people who have never smoked or who have smoked fewer than 100 cigarettes in their lives make up about 10 to 20 percent of lung cancer cases.
Scientists have long suspected that air pollution could be a contributing factor, but exactly how fine particulate matter in the air compares to tobacco smoking or secondhand smoke exposure remains unclear.
Some studies suggest that breathing polluted air is on par with smoking a pack a day, and yet these conclusions are mostly based on observational analyses.
The current study digs further by looking at some of the molecular mechanisms that may be at play. It compared the lung cancer genomes of the 871 non-smokers with tumors from 345 smokers, to find similarities and differences.
The majority of non-smokers with lung cancer had adenocarcinomas (the most common type of lung cancer), and nearly 5 percent of those tumors showed the SBS4 mutational signature.
In addition, 28 percent of non-smokers showed a new signature called SBS40a, which wasn't found in tobacco smokers. Strangely, the cause of this particular mutational driver was unknown, but doesn't seem to be environmental in nature.
"We see it in a majority of cases in this study, but we don't yet know what's driving it," says Alexandrov. "This is something entirely different, and it opens up a whole new area of investigation."
The current research relied only on regional air pollution levels, which means it can't say how much any one individual was directly exposed to fine particulate matter in the air. Participants who said they had never smoked may have also smoked more than reported.
These limitations notwithstanding, the overall findings align with other evidence indicating that soot or smog may trigger tumor growth in a similar way to cigarette chemicals.
"This is an urgent and growing global problem that we are working to understand regarding never-smokers," says epidemiologist Maria Teresa Landi from the NCI.
The team now hopes to expand their study to include cancer genomes from a more diverse, global cohort.
The study was published in Nature.
FDA Issues Warning Over Dangerous 'Gas Station Heroin' Substance
Mysterious Leprosy Pathogen Has Lurked in The Americas For 4,000 Years
Massive Review Finds No 'Safe' Level of Processed Meat Consumption
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Geek Vibes Nation
19 minutes ago
- Geek Vibes Nation
How To Protect PHI In The Cloud: A Healthcare Guide
Protected Health Information (PHI) refers to a person's health data, including medical records, diagnoses, treatment details, or billing information. This data can be collected and stored when individuals interact with healthcare providers, insurance companies, hospitals, or health-related platforms. Since this information is sensitive and personal, anyone who stores or manages PHI is responsible for keeping it secure, whether it's a healthcare organization, a digital health service, or a cloud provider. This includes information such as: Patient names Medical record numbers Health insurance details Social Security numbers Test results and prescriptions Dates of birth and addresses Billing and payment information PHI becomes especially sensitive because it combines personal identity with private medical data, making it a high-value target for cybercriminals. If this information is exposed or compromised, it can lead to: Identity theft Medical fraud Unauthorized use of insurance benefits Reputational harm Loss of trust in healthcare providers In the wrong hands, even a seemingly minor piece of PHI can be used to construct full identity profiles or conduct fraudulent activities, making the consequences of a data breach potentially devastating for both individuals and healthcare organizations. Moreover, mishandling PHI can trigger serious legal and financial penalties under privacy laws such as HIPAA (in the U.S.), which strictly governs how PHI should be stored, transmitted, and accessed. Because of this high sensitivity and legal responsibility, PHI demands the highest level of protection, especially when stored or processed in cloud environments. Key Challenges of Storing PHI in Cloud Environments Storing PHI in the cloud helps healthcare organisations scale quickly, reduce costs, and improve accessibility. However, it also brings several challenges. From legal compliance to security missteps, each issue needs to be addressed carefully to keep data safe. 1. Meeting Security and Compliance Requirements Healthcare data must comply with strict privacy and security laws such as HIPAA, GDPR, and local regulations. These laws define how PHI should be stored, accessed, and shared. In cloud environments, ensuring compliance requires strong encryption, strict access controls, audit logging, and regular risk assessments. If not implemented correctly, non-compliance can lead to serious penalties. 2. Understanding Shared Responsibility Cloud service providers manage the physical infrastructure and core services. However, healthcare organizations are still responsible for securing their data within the cloud. This includes setting up proper access control, using secure architecture, writing secure application code, applying data encryption, and regularly monitoring their systems. Without this, misconfigurations and security gaps are likely. 3. Rising Cybersecurity Threats PHI is a common target for cyberattacks because it holds high value. Threats like ransomware, phishing, and unauthorized access can lead to data breaches. If attackers gain access, the data can be sold, misused, or leaked, resulting in privacy loss, financial damage, and legal action against the healthcare provider. 4. Cloud Misconfigurations Simple mistakes such as leaving cloud storage buckets publicly accessible or forgetting to enable encryption can expose sensitive data. These misconfigurations often happen during manual setup or due to a lack of proper knowledge, and they're one of the leading causes of PHI exposure. Cloud platforms often rely on third-party tools for added functionality. If these external tools are not secure or compliant, they become a weak link. Healthcare organizations must evaluate every vendor they connect with to ensure they meet security standards. 6. Limited Visibility and Control In traditional on-premise systems, organizations can see and control everything. In cloud environments, that visibility is reduced. It becomes harder to track who accessed what data, when, and from where, especially if real-time monitoring tools like AWS CloudTrail or Azure Monitor aren't in place. 7. Data Location and Jurisdiction Risks Cloud providers may store data across global data centers. If PHI is stored in another country, it may fall under different legal systems. This can lead to conflicts with local regulations and affect data privacy. Healthcare providers must ensure that data is stored in permitted locations. Best Practices to Protect PHI in the Cloud Protecting PHI in the cloud requires a combination of the right technologies, strong policies, and well-planned system design. Below are some essential practices healthcare organizations should follow to keep individual medical data safe and compliant. 1. Choose a HIPAA-Compliant Cloud Provider Cloud providers like AWS, Azure, and GCP offer HIPAA-eligible services along with a signed Business Associate Agreement (BAA). For example, AWS HIPAA compliance ensures that healthcare organizations can use approved cloud services with the required security controls, encryption, and access management to safely process and store PHI. 2. Use Strong Data Encryption Data should be encrypted both at rest (when stored) and in transit (when being shared or moved). Most cloud platforms offer built-in encryption services. Organizations can also use Bring Your Own Key (BYOK) options for better control over encryption keys. 3. Implement Identity and Access Management (IAM) Not everyone needs access to all data. Use role-based access control (RBAC) to limit who can view or modify PHI. Also, enable multi-factor authentication (MFA) to add an extra layer of security when users log in. 4. Design a Secure Cloud Architecture Secure systems start with secure design. Use best practices like: Isolating sensitive workloads using virtual networks Applying firewalls and security groups Limiting public internet exposure Following the principle of least privilege These steps reduce the attack surface and help prevent unauthorized access. 5. Monitor, Audit, and Log Everything Set up continuous monitoring tools to detect unusual activities. Keep logs of who accessed what data and when. Regular auditing ensures that systems are working correctly and helps meet compliance standards. 6. Regular Backups and Disaster Recovery Create automatic backups of critical data and applications. Store them in secure, separate locations. Test your disaster recovery plans regularly to ensure systems can be restored quickly in case of an incident. 7. Train Your Staff Even strong technology can fail if employees are careless. Provide regular training on: Recognizing phishing attacks Following secure login practices Reporting suspicious activity Educated staff play a key role in keeping PHI safe. Conclusion Storing and protecting PHI in the cloud demands more than just a technical setup. It requires a security-first mindset backed by clear compliance measures. With growing data risks and strict regulations, healthcare providers must act wisely. Leveraging reliable and professional cloud consulting services ensures your cloud setup remains secure, HIPAA-compliant, and ready to scale with healthcare demands.


Washington Post
24 minutes ago
- Washington Post
Biden's former doctor asks to delay testimony to House panel, citing patient privilege concerns
WASHINGTON — Former President Joe Biden's physician has asked to delay his testimony before the House oversight committee this week, citing the need for an agreement that will respect doctor-patient confidentiality rules as part of the investigation into Biden's health in office. Dr. Kevin O'Connor, who served as Biden's physician at the White House, requested a delay until the end of July or early August 'to reach an accommodation that will protect the very substantial privilege and confidentiality interests of Dr. O'Connor and former President Biden,' according to a letter from his lawyer sent to Rep. James Comer of Kentucky on Saturday. The Associated Press obtained a copy of the letter.


CNN
34 minutes ago
- CNN
Judge temporarily blocks Trump administration from enforcing funding ban against Planned Parenthood
Source: CNN A federal judge on Monday temporarily blocked the Trump administration from enforcing a provision of President Donald Trump's sweeping domestic policy law to defund Planned Parenthood's health care services. The order from US District Judge Indira Talwani, an appointee of former President Barack Obama, blocks the provision's enforcement for 14 days. The measure would bar Medicaid users from coverage with a health care provider that also provides abortion services. The Planned Parenthood Federation of America – along with Planned Parenthood League of Massachusetts and Planned Parenthood Association of Utah – sued the administration earlier Monday, arguing that the funding ban would have devastating consequences across the country. While the legislation, which Trump signed on Friday, does not explicitly mention Planned Parenthood, the nationwide family planning and health care provider is in its crosshairs. The law prohibits federal funding for providers 'primarily engaged in family planning services, reproductive health, and related medical care' that also provide abortion. Planned Parenthood has warned that nearly 200 clinics nationwide – which also provide birth control, STI testing and treatment, and cancer screening – could close as a result of the bill's one-year ban on funds. Ninety percent of those clinics, Planned Parenthood says, are in states where abortion is legal. 'This case is about making sure that patients who use Medicaid as their insurance to get birth control, cancer screenings, and STI testing and treatment can continue to do so at their local Planned Parenthood health center, and we will make that clear in court,' Alexis McGill Johnson, president and CEO of Planned Parenthood Federation of America, said in a statement. The bill originally barred funds for ten years, before the Senate Parliamentarian, Elizabeth MacDonough, reduced the measure to one year. The Planned Parenthood Federation of America and the two local networks celebrated Monday's order, while warning in a statement of the consequences if the provision is ultimately allowed to take effect. 'Already, in states across the country, providers and health center staff have been forced to turn away patients who use Medicaid to get basic sexual and reproductive health care because President Trump and his backers in Congress passed a law to block them from going to Planned Parenthood,' the groups said. 'There are no other providers who can fill the gap if the 'defunding' of Planned Parenthood is allowed to stand.' CNN has reached out to the Department of Health and Human Services and the Centers for Medicare and Medicaid Services for comment. Earlier Monday, anti-abortion advocates quickly railed against Planned Parenthood's suit. 'Planned Parenthood's desperation is showing as they run to the courts again to fix a crisis of their own making,' said Susan B. Anthony's Pro-Life America director of legal affairs and policy counsel Katie Daniel. Planned Parenthood is also battling the Trump administration in court over cuts to a federal teen pregnancy prevention program. Lawyers for five Planned Parenthood networks argued in a federal District of Columbia court this June that administration's changes to the program, including limits on language around diversity and equity, were vague and could bar Planned Parenthood from providing longtime services. This story and headline have been updated with additional developments. See Full Web Article