AI Research
Cats distinguish their owner’s scent from stranger’s, study finds

Climate and science reporter

Domestic cats can tell the difference between the smell of their owner and that of a stranger, a new study suggests.
The study by Tokyo University of Agriculture found cats spent significantly longer sniffing tubes containing the odours of unknown people compared to tubes containing their owner’s smell.
This suggests cats can discriminate between familiar and unfamiliar humans based on their odour, the researchers say, but that it is unclear whether they can identify specific people.
Cats are known to use their strong sense of smell to identify and communicate with other cats, but researchers had not yet studied whether they can also use it to distinguish between people.
Previous studies of human recognition by cats have shown they are able to distinguish between voices, interpret someone’s gaze to find food, and change their behaviour according to a person’s emotional state that is recognised via their odour.
In the study published on Wednesday, researchers presented 30 cats with plastic tubes containing either a swab containing the odour of their owner, a swab containing the odour of a person of the same sex as their owner who they had never met, or a clean swab.
The swabs containing odours had been rubbed under the armpit, behind the ear, and between the toes of the owner or stranger.
Cats spent significantly more time sniffing the odours of unknown people compared to those of their owner or the empty tube, suggesting they can discriminate between the smells of familiar and unfamiliar people, the researchers said.
The idea of sniffing an unknown stimulus for longer has been shown before in cats – weaned kittens sniff unknown female cats for longer compared to their mothers.
However, the researchers cautioned that it cannot be concluded the cats can identify specific people such as their owner.
“The odour stimuli used in this study were only those of known and unknown persons,” said one of the study’s authors, Hidehiko Uchiyama.
“Behavioural experiments in which cats are presented with multiple known-person odour stimuli would be needed, and we would need to find specific behavioural patterns in cats that appear only in response to the owner’s odour.”

Serenella d’Ingeo, a researcher at the University of Bari who was not involved in this study but who has studied cat responses to human odours, also said the results demonstrated cats react differently to familiar and unfamiliar smells, but that conclusions couldn’t be drawn over their motivations.
“We don’t know how the animal felt during the sniffing… We don’t know for instance whether the animal was relaxed or tense,” she said.
Ms d’Ingeo added that the presentation of samples to cats by their own owners, who naturally added their own odour to the environment, could have increased the cats’ interest in the unfamiliar ones.
“In that situation, owners present not only their visual presence but also their odour,” she said.
“So of course if they present other odours that are different from their personal one, in a way they engage more the cat.”
The study’s authors concluded that “cats use their olfaction [smell] for the recognition of humans”.
They also noted cats rubbed their faces against the tubes after sniffing – which cats do to mark their scent on something – indicating that sniffing may be an exploratory behaviour that precedes odour marking.
The researchers cautioned that this relationship needs further investigation, along with the theory of whether cats can recognise a specific person from their smell.
AI Research
In the News: Thomas Feeney on AI in Higher Education – Newsroom

“I had an interesting experience over the summer teaching an AI ethics class. You know plagiarism would be an interesting question in an AI ethics class … They had permission to use AI for the first written assignment. And it was clear that many of them had just fed in the prompt, gotten back the paper and uploaded that. But rather than initiate a sort of disciplinary oppositional setting, I tried to show them, look, what you what you’ve produced is kind of generic … and this gave the students a chance to recognize that they weren’t there in their own work. This opened the floodgates,” Feeney said.
“I think the focus should be less on learning how to work with the interfaces we have right now and more on just graduate with a story about how you did something with AI that you couldn’t have done without it. And then, crucially, how you shared it with someone else,” he continued.
AI Research
Philippines businesses remain slow in adopting AI – study – Philstar.com
AI Research
First ‘vibe hacking’ case shows AI cybercrime evolution and new threats

NEWYou can now listen to Fox News articles!
A hacker has pulled off one of the most alarming AI-powered cyberattacks ever documented. According to Anthropic, the company behind Claude, a hacker used its artificial intelligence chatbot to research, hack, and extort at least 17 organizations. This marks the first public case where a leading AI system automated nearly every stage of a cybercrime campaign, an evolution that experts now call “vibe hacking.”
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER
HOW AI CHATBOTS ARE HELPING HACKERS TARGET YOUR BANKING ACCOUNTS
Simulated ransom guidance created by Anthropic’s threat intelligence team for research and demonstration purposes. (Anthropic)
How a hacker used an AI chatbot to strike 17 targets
Anthropic’s investigation revealed how the attacker convinced Claude Code, a coding-focused AI agent, to identify vulnerable companies. Once inside, the hacker:
- Built malware to steal sensitive files.
- Extracted and organized stolen data to find high-value information.
- Calculated ransom demands based on victims’ finances.
- Generated tailored extortion notes and emails.
Targets included a defense contractor, a financial institution and multiple healthcare providers. The stolen data included Social Security numbers, financial records and government-regulated defense files. Ransom demands ranged from $75,000 to over $500,000.
Why AI cybercrime is more dangerous than ever
Cyber extortion is not new. But this case shows how AI transforms it. Instead of acting as an assistant, Claude became an active operator scanning networks, crafting malware and even analyzing stolen data. AI lowers the barrier to entry. In the past, such operations required years of training. Now, a single hacker with limited skills can launch attacks that once took a full criminal team. This is the frightening power of agentic AI systems.
HOW AI IS NOW HELPING HACKERS FOOL YOUR BROWSER’S SECURITY TOOLS

A simulated ransom note template that hackers could use to scam victims. (Anthropic)
What vibe hacking reveals about AI-powered threats
Security researchers refer to this approach as vibe hacking. It describes how hackers embed AI into every phase of an operation.
- Reconnaissance: Claude scanned thousands of systems and identified weak points.
- Credential theft: It extracted login details and escalated privileges.
- Malware development: Claude generated new code and disguised it as trusted software.
- Data analysis: It sorted stolen information to identify the most damaging details.
- Extortion: Claude created alarming ransom notes with victim-specific threats.
This systematic use of AI marks a shift in cybercrime tactics. Attackers no longer just ask AI for tips; they use it as a full-fledged partner.
GOOGLE AI EMAIL SUMMARIES CAN BE HACKED TO HIDE PHISHING ATTACKS

A cybercriminal’s initial sales offering on the dark web seen in January 2025. (Anthropic)
How Anthropic is responding to AI abuse
Anthropic says it has banned the accounts linked to this campaign and developed new detection methods. Its threat intelligence team continues to investigate misuse cases and share findings with industry and government partners. The company admits, however, that determined actors can still bypass safeguards. And experts warn that these patterns are not unique to Claude; similar risks exist across all advanced AI models.
How to protect yourself from AI cyberattacks
Here’s how to defend against hackers now using AI tools to their advantage:
1. Use strong, unique passwords everywhere
Hackers who break into one account often attempt to use the same password across your other logins. This tactic becomes even more dangerous when AI is involved because a chatbot can quickly test stolen credentials across hundreds of sites. The best defense is to create long, unique passwords for every account you have. Treat your passwords like digital keys and never reuse the same one in more than one lock.
Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords
2. Protect your identity and use a data removal service
The hacker who abused Claude didn’t just steal files; they organized and analyzed them to find the most damaging details. That illustrates the value of your personal information in the wrong hands. The less data criminals can find about you online, the safer you are. Review your digital footprint, lock down privacy settings, and reduce what’s available on public databases and broker sites.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

Illustration of a hacker at work. (Kurt “CyberGuy” Knutsson)
3. Turn on two-factor authentication (2FA)
Even if a hacker obtains your password, 2FA can stop them in their tracks. AI tools now help criminals generate highly realistic phishing attempts designed to trick you into handing over logins. By enabling 2FA, you add an extra layer of protection that they cannot easily bypass. Choose app-based codes or a physical key whenever possible, as these are more secure than text messages, which are easier for attackers to intercept.
4. Keep devices and software updated
AI-driven attacks often exploit the most basic weaknesses, such as outdated software. Once a hacker knows which companies or individuals are running old systems, they can use automated scripts to break in within minutes. Regular updates close those gaps before they can be targeted. Setting your devices and apps to update automatically removes one of the easiest entry points that criminals rely on.
5. Be suspicious of urgent messages
One of the most alarming details in the Anthropic report was how the hacker used AI to craft convincing extortion notes. The same tactics are being applied to phishing emails and texts sent to everyday users. If you receive a message demanding immediate action, such as clicking a link, transferring money or downloading a file, treat it with suspicion. Stop, check the source and verify before you act.
6. Use a strong antivirus software
The hacker in this case built custom malware with the help of AI. That means malicious software is getting smarter, faster and harder to detect. Strong antivirus software that constantly scans for suspicious activity provides a critical safety net. It can identify phishing emails and detect ransomware before it spreads, which is vital now that AI tools make these attacks more adaptive and persistent.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech

Over 40,000 Americans were previously exposed in a massive OnTrac security breach, leaking sensitive medical and financial records. (Jakub Porzycki/NurPhoto via Getty Images)
7. Stay private online with a VPN
AI isn’t only being used to break into companies; it’s also being used to analyze patterns of behavior and track individuals. A VPN encrypts your online activity, making it much harder for criminals to connect your browsing to your identity. By keeping your internet traffic private, you add another layer of protection for hackers trying to gather information they can later exploit.
For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices at Cyberguy.com/VPN
CLICK HERE TO GET THE FOX NEWS APP
Kurt’s key takeaways
AI isn’t just powering helpful tools; it’s also arming hackers. This case proves that cybercriminals can now automate attacks in ways once thought impossible. The good news is, you can take practical steps today to reduce your risk. By making smart moves, such as enabling two-factor authentication (2FA), updating devices, and using protective tools, you can stay one step ahead.
Do you think AI chatbots should be more tightly regulated to prevent abuse? Let us know by writing to us at Cyberguy.com/Contact
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER
Copyright 2025 CyberGuy.com. All rights reserved.
-
Business2 weeks ago
The Guardian view on Trump and the Fed: independence is no substitute for accountability | Editorial
-
Tools & Platforms1 month ago
Building Trust in Military AI Starts with Opening the Black Box – War on the Rocks
-
Ethics & Policy2 months ago
SDAIA Supports Saudi Arabia’s Leadership in Shaping Global AI Ethics, Policy, and Research – وكالة الأنباء السعودية
-
Events & Conferences4 months ago
Journey to 1000 models: Scaling Instagram’s recommendation system
-
Jobs & Careers2 months ago
Mumbai-based Perplexity Alternative Has 60k+ Users Without Funding
-
Podcasts & Talks2 months ago
Happy 4th of July! 🎆 Made with Veo 3 in Gemini
-
Education2 months ago
VEX Robotics launches AI-powered classroom robotics system
-
Education2 months ago
Macron says UK and France have duty to tackle illegal migration ‘with humanity, solidarity and firmness’ – UK politics live | Politics
-
Podcasts & Talks2 months ago
OpenAI 🤝 @teamganassi
-
Funding & Business2 months ago
Kayak and Expedia race to build AI travel agents that turn social posts into itineraries