
Your cat may not show it – but it definitely knows your scent
Cats can tell their owners apart from strangers from the scent of their human companions, a new study reveals.
Researchers from the Tokyo University of Agriculture say cats tend to spend a longer time sniffing the odour of a stranger than that of their owner, suggesting they can recognise familiar humans quickly based on smell.
Previous studies have shown that cats use their sense of smell to identify other felines and communicate with each other.
Whether they can also use scent to distinguish between humans has been unclear, however.
The latest study, published on Wednesday in the journal PLoS, sought to find out if cats could tell familiar and unfamiliar humans apart based on smell alone.
Researchers tested 30 domestic cats by presenting them with plastic tubes containing swabs rubbed under the armpit, behind the ear, and between the toes of either their owner or a human they had never met.
They asked the cat owners to complete an online questionnaire to assess their pet's personality and their relationship.
They observed that the study cats spent significantly longer sniffing an unknown odour than that of their owner or an empty tube.
The felines tended to sniff unknown odours with their right nostril initially before switching to the left nostril as they became more familiar with the smell.
Researchers found that male cats with seemingly neurotic personalities tended to sniff each tube repetitively. To the contrary, males with more agreeable personalities sniffed the tubes more calmly.
No such effect of personality was seen on the behaviour of female cats during the experiment, according to the study.
The findings suggest domestic cats can distinguish between familiar and unfamiliar humans based on their odour. It is still unclear, however, whether they identify specific humans based on smell alone.
The research also reveals that cats have a right nostril preference for investigating new smells, indicating they may favour different hemispheres of their brain for different tasks.
This phenomenon has previously been seen in other animals such as dogs, fish and birds.
'We suggest that cats use their olfaction for the recognition of humans. Also, we record characteristic rubbing behaviour occurring after sniffing, indicating that sniffing may be an exploratory behaviour preceding the rubbing of odour in cats,' the study notes.
'This relationship warrants further investigation along with the theory of whether cats are able to recognize a specific person from olfactory cues.'
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


The Independent
4 hours ago
- The Independent
Animal welfare concerns halt hotel's panda wake-up service
A Chinese hotel's unique red panda wake-up service, where the animals visit guests' rooms and climb on beds, has been ordered to stop. The Chongqing Forestry Bureau mandated the halt due to concerns over animal welfare, potential injury, and disease transmission. The Lehe Ledu Liangjiang Holiday Hotel in Chongqing attracted many guests specifically for this popular interaction with its four resident red pandas. Animal rights experts, including Sun Quanhui from World Animal Protection, stated that red pandas are a nationally protected species and should not be used for entertainment, citing their sensitive nature. The forestry bureau is currently conducting an on-site investigation at the hotel and will release its findings.


Telegraph
6 hours ago
- Telegraph
China increases cyber attacks on hospitals to ‘humiliate' Taiwan
In early February, staff at Taiwan's MacKay Memorial Hospital were attempting to access patient records when they noticed a problem. A virus had ripped through their computer system, causing hundreds of computers to crash and blocking their access to patient records. It was the work of a 20-year-old Chinese hacker named Lo Chengyu, known as 'Crazyhunter', who had stolen 16.6 million patient records, according to police. Lo demanded a ransom of $100,000, but when the hospital refused, he set up a website where he released the victims' names and threatened to post their records as well. However, security experts managed to expel the virus with no money exchanged. Since February, Taiwan has experienced an increase in the number of cyber attacks against hospitals, along with local government and tax offices, with the majority coming from China. China claims Taiwan as part of its territory, which the government in Taipei firmly rejects, and has threatened to invade the island on multiple occasions. While Beijing has yet to use full-blown force, it has employed a wide range of 'grey-zone' measures, which fall short of open warfare but seek to coerce Taiwan and grind the country down ahead of a possible attack. Over the last three years, Taiwan has made significant strides in developing mechanisms to protect itself against Chinese grey-zone attacks, but many vulnerabilities remain, especially in cyber space. 'They have no capability to attack our defence department website or foreign affairs website or the Ministry of Digital Affairs website,' said Herming Chiueh, the country's deputy minister of digital affairs. 'So they need to shift their attack to our weak part, which are hospitals,' he said during an interview in June. Mr Chiueh's rise to the job reflects the rapid growth of Taiwan's cyber security team and its expanding capabilities. He assumed the role in 2022 – the same year the ministry was founded – taking leave from his work as an engineering professor at a university in Hsinchu, Taiwan's main technology hub. In three short years, Taiwan's cyber security mandate has grown from a 20-person team within the executive branch to nearly 500 people spread out across the entire government as the country faces a rapidly intensifying crisis. Last year, the island experienced an average of 2.4 million cyber attacks daily – double the daily average in 2023 – with 80 per cent targeting government agencies. While data for the first half of 2025 is not yet available, Mr Chiueh said the amount has only continued to increase. This is partly because Taiwan now has more sensors that are able to detect attacks and partly because China has thrown so many resources into expanding its cyber technology and ability to launch cyber attacks. Attacks on hospitals Hospital networks store some of the most personal information on a person – from family history to detailed accounts of any sicknesses, making them prime targets for an adversary. The attacks against hospitals, which have been primarily centred on obtaining personal data, seem to be an attempt by China to show off its cyber strengths. They are likely part of a multi-pronged effort by China to intimidate Taiwan by highlighting its vulnerabilities, as well as to lay the groundwork for a potential future invasion. 'The only purpose is to try to humiliate and show that they have the capability to disturb us as a society,' said Mr Chiueh. He explained that the hackers will often post the data that they harvest on the dark web as a trophy, similar to what Lo threatened to do with the data from MacKay Memorial Hospital. Lennon Chang, a cyber security expert and associate professor at Deakin University in Australia, said that by posting sensitive information online, Chinese hackers could instil doubt over the government's ability to protect its citizens. 'It could create negative impressions or images of leaders in Taiwan,' he said. Hospitals are also an integral part of a country's resilience during wartime. An adversary's ability to interrupt or incapacitate a target's healthcare network during an assault could provide them with a significant advantage. 'They could be trying to reveal the vulnerabilities of these hospitals so that during critical times they will be able to hack into and shut down the system or create a mess within the hospitals,' said Mr Chang. Seven 'cyber armies' Taiwan has traced the majority of its cyber attacks back to China and the Ministry of Digital Affairs suspects that the Chinese Communist Party is behind many of them, although the exact proportion is unknown. Mr Chiueh explained that China has seven 'cyber armies' – two of which are focused exclusively on Taiwan, while, by contrast, only one is focused on the United States. In April last year, China established the People's Liberation Army Cyberspace Force – the latest iteration of a cyber warfare military unit, which it runs in secret to maintain 'national cyber sovereignty'. Mr Chiueh said: 'If you compare cyber attacks with the US and Taiwan federal governments, our government gets seven times the number of attacks.' The Ministry of Digital Affairs' monthly cyber security report from April found that the most common type of attack was information collection, followed by intrusion, which mostly involved unauthorised access to systems. One type of intrusive attack that the ministry has followed closely are distributed denial of service (DDoS) attacks, which flood servers with traffic to shut them down. These attacks have increased six-fold in the last three years, with a notable spike following Nancy Pelosi's visit to Taiwan in August 2022 while she was the speaker of the US House of Representatives. Ms Pelosi was the first high-level official to visit Taiwan in 25 years. China saw the visit as a sign of US support for the island and responded with a wave of grey-zone tactics, which have continued up to now. 'With DDoS attacks, there is a pattern. The attack will begin at 9 o'clock in the morning, then there will be a lunch break from 12 o'clock to 1 o'clock, then the attacker will end at 5,' said Mr Chiueh. 'The working hours are in the same time zone as us.' Taiwan has also traced the IP addresses of many of the hacks to compromised devices known to be connected to the Chinese military. The types of information targeted in many cyber attacks also suggests that the Chinese government is responsible. Chinese hackers have been using 'very sophisticated social engineering', such as phishing software, to target the personal devices of 'specific government officials' and 'collect lots of intel around these people,' said Mr Chiueh. 'The reason they need to collect data is to cyber attack our critical infrastructure or use the information they collect to spread disinformation or misinformation. Both of these are the behaviours of a hostile enemy,' said Mr Chiueh. Underwater vulnerabilities While cyber security remains a focus for Taipei, another rising grey-zone threat is the country's undersea submarine cables. Taiwan relies on 24 underwater cables – 14 international ones and 10 domestic – to carry 99 per cent of its internet traffic. These cables are normally buried at least a couple of metres below the sea bed to protect them, but Chinese vessels continue to find ways of dredging them up. Since 2019, there have been dozens of incidents involving Chinese ships – often fishing or cargo boats – which have destroyed the cables and cut off internet access to entire islands. In 2023, two boats cut the cables providing internet to Taiwan's outlying Matsu Island, leaving 12,000 residents without connection for almost two months. Beijing has routinely denied any responsibility for these incidents, claiming they were either accidents or that the damages were caused by natural decay. Mr Chiueh said the likelihood of an attack against Taiwan's undersea cables today is higher than that of a large-scale cyber attack because 'the cost is much higher than to hire a few boats to cut our subsea cables'. Taiwan has taken measures to deter any kind of destruction. In 2023, after the Matsu incident, Taiwan amended its telecommunications law to criminalise undersea cable attacks with a punishment of one to seven years in prison and a fine of up to NTD$10 million (£250,000). Last week, Taiwan sentenced a Chinese boat captain to three years in prison for damaging an undersea cable linking Taiwan's main island to the outlying Penghu Islands. However, stronger punitive action is not the only way that Taiwan has been responding to China's growing pressure – the island has also been improving its own resilience and deterrence capabilities. Mr Chiueh said that the two cables to Matsu were damaged again earlier this year due to natural causes, yet instead of waiting six weeks, residents were back online almost immediately thanks to new microwave back-ups installed on the island. Taiwan's ability to deter cyber attacks is also improving. While the number of attacks increased this year, there were fewer breaches compared to last year. But experts caution that the country still has a way to go. Mr Chang said that if China were to launch a full-scale cyber attack tomorrow, Taiwan would 'definitely be in a lot of trouble'. 'Taiwan has built quite a good capacity in cyber resilience in the past few years, but there are still areas that need to be addressed,' added Mr Chang.


The Sun
14 hours ago
- The Sun
Watch moment iconic car maker enters space race after successfully launching reusable rocket
Eliana Nunes Published: Invalid Date, THIS is the spectacular moment one of the world's largest car manufacturers successfully launched a reusable rocket. Honda R&D - the research and development arm of Honda Motor - landed a rocket for the first time on Tuesday - after it reached an altitude of nearly 1,000 feet. 4 The experimental reusable rocket reached an altitude of 890 feet during its test flight - staying aloft for 56.6 seconds. It landed just 14.6 inches from its target touchdown point at the carmaker's test facility in northern Japan, according to Honda. Weighing in at 2,890 pounds when fully fuelled (1,984 pounds dry), the rocket is 20.7 feet tall and measured 2.8 feet in diameter. Honda's rocket has become the first prototype rocket outside the US and China to pull off a flight like this. The company said the launch and landing test demonstrated "key technologies essential for rocket reusability, such as flight stability during ascent and descent, as well as landing capability". The Japanese car manufacturer first revealed in 2021 that it had been working on a rocket engine for at least two years. After six years of development, this successful test marked a major step in Honda's push into space innovation. But Honda is not alone in the race beyond Earth. Other car makers like Geely, GM, Hyundai-Kia, Toyota and Venturi are partnering with space tech companies. Unlike Honda and Venturi that have developed rockets or space vehicles, Toyota has been involved more in robotics and space exploration tech. Vid shows supersonic test launch in bid for 1hr cross-Atlantic flights in 5yrs Geely, GM and Hyundai-Kia are partnering with aerospace firms or investing in space tech startups - rather than independently developing rockets yet. It comes after talk of a merger between car rivals Nissan and Honda collapsed in February. But the door to collaboration remains wide open. Nissan's CEO Ivan Espinosa said in March that the company is "very open" to partnerships. The company's chief performance officer, Guillaume Cartier, said Nissan had "never stopped" talking with its Japanese rival, confirming that the two continue working towards a potential partnership. Espinosa, who officially took over on April 1, said his company faces up to five simultaneous crises - including a damaged brand, low morale and the execution of a sweeping turnaround. Speaking at a company event, he said: "The way we are seeing partners is broadly, not only thinking about cars but how to push Nissan into the next era of technology." Toshihiro Mibe has been the CEO of Honda Motor Co. since 2021.