Home Blog Page 3

Exploring the dog–human relationship

dog–human relationship

MRI studies exploring the dog–human relationship, particularly those led by neuroscientist Gregory Berns at Emory University, have revealed that dogs experience a profound emotional connection with their humans. In one key experiment, when dogs were exposed to various scents while in an fMRI scanner, only the scent of a familiar human (such as their owner) activated the caudate nucleus — the brain’s reward center associated with positive emotions and motivation. This response was stronger than for scents from food, other dogs (even familiar ones), unfamiliar humans, or even the dog’s own scent, suggesting that dogs prioritize their bond with us above other stimuli.

Other studies of the dog–human relationship build on this by showing that dogs’ brains light up similarly in response to their owner’s praise or voice, often as much as or more than to treats, highlighting individual preferences for social rewards over food.

Additional fMRI research has found activations in areas linked to emotion and attachment (like the insula and amygdala) when dogs view their caregiver’s face, mirroring the secure bond seen in human parent-child relationships — even responding positively to an angry expression from their owner.

These insights confirm that the dog-human connection is deeply reciprocal, driven by neural mechanisms that make our companionship incredibly rewarding for them.

Gregory Berns has conducted extensive research on canine cognition using functional magnetic resonance imaging (fMRI) on awake, unrestrained dogs. His work began around 2012 with the Dog Project, which has trained over 80 dogs to voluntarily enter MRI scanners and remain still without sedation, using positive reinforcement techniques like treats and praise.

Beyond the well-known scent study on familiar odors (which showed activation in the caudate nucleus for owners’ scents), here are some of his other key dog studies, drawn from his publications and project descriptions:

Functional MRI in Awake Unrestrained Dogs (2012)

This foundational study demonstrated the feasibility of performing fMRI on dogs without sedation or restraints. Two dogs were initially trained to hold a down-stay in a custom chin rest while exposed to MRI noise, allowing for the first-ever scans of canine brain activity in response to hand signals indicating food rewards or no rewards. Findings showed distinct activation in the brain’s reward system, paving the way for non-invasive canine neuroscience.

Replicability and Heterogeneity of Awake Unrestrained Canine fMRI Responses (2013)

Building on the initial MRI work, this examined the consistency and variability of brain responses across multiple scans and dogs. It highlighted individual differences in how dogs’ brains process stimuli, emphasizing the need for larger sample sizes in canine neuroimaging.

One Pair of Hands is Not Like Another: Caudate BOLD Response in Dogs Depends on Signal Source and Canine Temperament (2014)

This investigated how dogs’ brain reward centers (caudate) respond to hand signals from different people, factoring in the dogs’ temperaments. Results showed stronger activations when signals came from familiar handlers, with variations based on whether the dog was bold or shy, suggesting personalized social cognition in canines.

Functional MRI in Awake Dogs Predicts Suitability for Assistance Work (2017)

Focused on service dogs, this used fMRI to scan brain responses to tasks and predict which dogs would succeed in assistance training programs. Dogs showing stronger activations in areas linked to impulse control and reward processing were more likely to graduate, offering a neural tool for selecting candidates and potentially reducing training failure rates.

Dogs Process Numerical Quantities in Similar Brain Region as Humans (2019)

In this experiment, dogs viewed varying numbers of dots on screens during fMRI scans without prior training. Their parietotemporal cortex activated in response to quantity changes, mirroring human numerical processing regions, indicating that basic numerosity might be an innate ability in dogs rather than learned.

Preference for Praise vs. Food (2016)

Dogs were scanned while receiving either verbal praise from owners or food treats. Brain reward areas lit up more for praise in some dogs, revealing individual preferences for social rewards over tangible ones, akin to human attachment dynamics.

Face Processing in Dogs

Explored how dogs’ brains handle facial recognition, with fMRI showing activations in temporal regions when viewing human and dog faces, suggesting specialized neural pathways for social cues.

Self-Restraint and Impulse Control

Behavioral and fMRI data assessed dogs’ ability to inhibit actions, linking brain activity in prefrontal areas to better self-control, with implications for training and behavior modification.

Berns has also applied his research to practical areas, such as early cancer detection in dogs via routine MRI health screenings, noting that up to half of aging dogs develop cancer and that awake scanning could enable curable interventions. His findings are detailed in books like How Dogs Love Us (2013) and What It’s Like to Be a Dog (2017), which synthesize these studies to argue for deeper human-canine bonds and ethical treatment of animals.

For a full list of his 130+ publications (many on dogs), his ResearchGate profile or personal website provides comprehensive access.




 

How prepared are we for a powerful Solar Event?

Solar Event

A powerful solar event, such as a major solar flare or coronal mass ejection (CME), can trigger geomagnetic storms that disrupt Earth’s magnetic field, inducing currents in power grids, satellites, and communication systems. These events, like the 1859 Carrington Event — the strongest on record — could today cause widespread blackouts, satellite failures, GPS degradation, and economic losses in the trillions of dollars if unprepared. With Solar Cycle 25 peaking around 2025, the risk of such storms increases, though the probability of a Carrington-level event in the next decade is estimated at 2-12% or up to 25% by some models.

Current Monitoring and Warning Systems

Global preparedness has advanced significantly through space weather forecasting. Agencies like NOAA’s Space Weather Prediction Center (SWPC) and NASA provide real-time alerts, predicting storm arrivals hours to days in advance, allowing operators to mitigate risks such as by maneuvering satellites or adjusting power grids.

For instance:

    • SWPC issues G-scale alerts (G1 minor to G5 extreme) for geomagnetic storms, directly supporting North American grid operators to prevent damage from induced currents.
    • International efforts, including the ITU and ESA, emphasize resilient infrastructure, with radiation-resistant satellites and grid protections blocking geomagnetic currents.
    • Research at institutions like the University of Florida and University of Hawaiʻi is enhancing forecasts using AI and particle measurements to better prepare for the 2025 solar maximum.

Countries like New Zealand are noted for leading in preparedness, with robust grid protections and emergency protocols. The EU has highlighted solar storms as an emerging challenge, advocating for better coordination.

Infrastructure Mitigation Measures

    • Power Grids: Some regions, like Quebec after the 1989 blackout, have invested billions in hardening transformers and adding surge protectors. In the US, utilities are implementing precautions, though often designed for milder storms rather than extreme ones. Grids can be temporarily shut down (up to 6 days in NZ) to safeguard equipment.
    • Satellites and Aviation: Operators use forecasts to reposition satellites or reroute flights to avoid radiation spikes. Modern designs include better shielding, reducing vulnerability compared to past events.
    • Communications and GPS: Backup systems and diversified networks help, but high-frequency radio blackouts remain a risk, especially on Earth’s nightside.
    • Individual and Community Prep: Recommendations include stocking water, non-perishable food, NOAA weather radios, flashlights, and portable power sources like solar chargers or generators. Community initiatives, such as solar-powered shelters in vulnerable areas, enhance local resilience.

Recent events, like the May 2024 G5 storm, tested these measures with minimal widespread disruption, showing progress in resilience.

Gaps and Challenges

Despite advancements, preparedness is uneven. A May 2025 US tabletop exercise by Johns Hopkins APL revealed major weaknesses in response coordination across government and industry levels. Experts warn that a Carrington-level storm could cause years-long outages, with recovery taking up to a decade and costing trillions. Small electronics like phones and cars are likely safe, but large-scale grids and transformers remain vulnerable without full retrofitting.

Public awareness is growing, with resources like checklists and educational programs, but broader investments in solar science and infrastructure hardening are needed to close gaps. As of September 2025, while monitoring is strong, full readiness for the most extreme scenarios lags, emphasizing the need for ongoing global collaboration.




 

Europe’s oldest palace — Knossos, Crete

Knossos

Knossos Palace, located on the island of Crete in Greece, is widely regarded as Europe’s oldest palace, with its origins tracing back to the Bronze Age Minoan civilization. Often associated with the legendary King Minos and the myth of the Minotaur, it represents one of the earliest centers of advanced European society.

The site of Knossos has been inhabited since around 7000 BC, during the Neolithic period, making it one of the oldest known settlements in Crete and possibly Europe. The first palace structure was constructed around 1900-2000 BC at the start of the Middle Minoan period, built on earlier foundations and serving as a hub for religious, administrative, and economic activities rather than strictly a royal residence.

It underwent destruction and rebuilding, notably around 1650 BC due to earthquakes, and reached its peak prosperity between 1650 and 1450 BC. By around 1450 BC, following invasions or disasters that destroyed other Minoan palaces, Knossos came under Mycenaean influence and was the last major Minoan center standing. The palace was ultimately abandoned or destroyed by fire around 1350-1375 BC, though the site continued to hold cultural importance in later Greek, Roman, and Byzantine periods.

Modern excavations began in the late 19th century, with British archaeologist Sir Arthur Evans leading major digs from 1900 onward, though his extensive reconstructions have sparked debate over authenticity. In 2025, Knossos was designated a UNESCO World Heritage Site for its historical value.

Knossos earns its title as Europe’s oldest palace due to its early construction date (around 1900 BC), predating other known European palatial structures by centuries, and its role as the epicenter of the Minoan civilization — the first advanced Bronze Age society in Europe, influencing trade, art, and architecture across the Mediterranean. While medieval castles like Windsor (built in 1070 AD) are often cited as ancient, they are far younger than this prehistoric Minoan complex.

Architecture and Features

Spanning about 150,000 square feet, the palace was a multi-story complex organized around a large rectangular central court used for rituals and gatherings.

Key elements include:

Storage Magazines:

Vast rooms with massive pithoi (jars) for storing oil, grain, wine, and other goods, highlighting the site’s economic role.

Throne Room:

Dating to the 15th century BC, this is considered the oldest throne room in Europe, featuring an alabaster throne, gypsum benches, and frescoes of griffins—possibly used for ceremonies involving a priest-king or deity.

Frescoes and Art:

Vibrant wall paintings depicting bull-leaping, processions, marine life, and daily scenes, showcasing Minoan artistic sophistication.

Advanced Engineering:

Innovative plumbing with terracotta pipes, aqueducts for fresh water, drainage systems, and even flushing toilets — remarkable for the era.

Labyrinthine Layout:

The complex’s maze-like corridors and rooms inspired the Greek myth of the Labyrinth designed by Daedalus to house the Minotaur.

The architecture used stone, timber, and plaster, with distinctive Minoan columns that tapered downward. Evans’ restorations, including concrete reinforcements, have preserved much of the site but altered some original elements.

As Greece’s most visited archaeological site, Knossos offers insights into Minoan culture, from trade networks spanning Egypt and the Near East to early writing systems like Linear A and B. It symbolizes the dawn of European civilization, blending history, mythology, and archaeology. Visitors can explore the ruins near Heraklion, Crete, though it’s recommended to go with a guide for context on its mythical and historical layers.




 

Toby’s House Crisis Nursery Secures Land

Crisis Nursery

Toby’s House Crisis Nursery, a nonprofit in Great Falls, dedicated to preventing child abuse and neglect, has secured land for a new facility after an extensive search spanning months. This milestone, announced in mid-September, marks a significant step forward for the organization, which provides crisis, respite, and transitional care for children ages 0-6 at no cost and without income requirements.

Named in memory of October “Toby” Perez, a 2-year-old who tragically died from abuse in 2011, the nursery offers short-term refuge (up to 72 hours) for children in high-stress family situations, such as parental substance use, mental health challenges, or temporary instability. It helps prevent child welfare interventions by giving parents a safe drop-off option while connecting families to support services. Since opening in late 2020, demand has grown alongside rising abuse reports in Cascade County — from 217 cases in 2012 to 551 in 2017, with trends continuing amid Montana’s opioid and meth crises.

A generous donor purchased the new site, enabling the expansion without immediate financial strain on the nonprofit. The location provides room for a larger building, initially planned to increase capacity from the current setup (which supports up to 8 children) to potentially 16–24 beds in the future. This addresses space constraints that have limited services despite increasing community needs.

As Montana’s first crisis nursery, Toby’s House is now serving as a statewide model. In partnership with the state’s Birth to Five program and a federal Preschool Development Grant (PDG B-5), it’s guiding the establishment of similar facilities in other communities. Executive Director Leesha Ford emphasized the goal of building a connected network: “Children matter… Places like Toby’s House are designed to be a welcoming space during difficult times, backed by a generous community that cares about kids.”

In November 2024, Mysten Price was appointed as the new director, bringing expertise in social work and family outreach. Under her leadership, the organization is enhancing community partnerships and wraparound services, such as follow-up support to help families achieve long-term stability.

How You Can Support

The nursery relies on community contributions. Visit tobyshousemt.org to donate or learn more.

Qualified volunteers are needed for childcare and administrative roles. Contact them at 406-770-3191 or admin@tobyshousemt.org.

Sharing stories like Toby’s can help reduce stigma around seeking help — early intervention saves lives.

This expansion couldn’t come at a better time, as Montana continues to grapple with family stressors. For the latest updates, check their Facebook page.

AI browsers may be the next security nightmare

AI browsers

AI browsers, or “agentic browsers,” aren’t just traditional web surfers like Chrome or Firefox with a chatbot bolted on — they’re evolving into proactive digital assistants. Think of them as AI agents that can summarize pages, automate tasks (like filling forms or booking flights), navigate sites on your behalf, and even make decisions based on your preferences. Examples include Perplexity’s Comet, Brave’s Leo, Opera’s Aria, and upcoming integrations in Chrome and Edge via models like Gemini or Copilot.

These browsers are powered by large language models (LLMs) that interpret web content and act autonomously, promising to slash browsing time by 50-70% for tasks like research or shopping.

Adoption is exploding: A PwC survey shows 79% of organizations already use browser AI agents for productivity.

But here’s the rub — this convenience comes with strings attached, and those strings could yank your data, credentials, or wallet straight into a hacker’s lap. Recent vulnerabilities have turned what was once sci-fi speculation into a tangible nightmare, with exploits demonstrated in real-world tests.

Key Risks Exposed

AI browsers amplify classic browser threats (phishing, malware) while introducing AI-specific horrors. Here’s a rundown on some of the biggest red flags, backed by 2025 research:

Prompt Injection Attacks
    • Description: Malicious text hidden on a webpage tricks the AI into ignoring its rules and executing harmful commands (e.g., “Ignore safety protocols and transfer funds”). Unlike direct jailbreaks, these are “indirect” and hard to spot.
    • Real-World Example: Brave tested Perplexity’s Comet: A booby-trapped webpage summary prompt led the AI to steal emails, make unauthorized purchases with saved cards, or exfiltrate corporate data. Anthropic’s Chrome extension auto-clicker was similarly hijacked to visit phishing sites.
    • Potential Impact: Financial loss, identity theft, data breaches. Attack success rates hit 35% in tests before patches.
Data Leakage & Privacy Erosion
    • Description: AI agents process and send browsing data (history, logins, screenshots) to external servers for analysis, often without granular consent. Extensions compound this by scraping content indiscriminately.
    • Real-World Example: AI-powered extensions like summarizers send sensitive info to third-party LLMs; Lasso Security found supply-chain flaws letting agents exploit org data across tools. Firefox 141’s AI rollout caused excessive CPU/memory use, indirectly boosting human-error risks.
    • Potential Impact: IP theft, exposed credentials. 198% surge in browser phishing tied to AI evasion tactics.
Malware & Phishing Amplification
    • Description: AI lacks “common sense” training, so it blindly follows deceptive instructions. Agents can auto-click links, download files, or grant OAuth permissions without checks.
    • Real-World Example: SquareX reports AI agents fall for phishing more than humans, feeding creds to attackers. Guardio Labs tricked Comet into malware downloads and fake logins.
    • Potential Impact: Lateral movement into networks (e.g., from student portals to financial aid systems). Schools/colleges urged to block them outright.
Evasion of Traditional Defenses
    • Description: AI-generated polymorphic malware adapts in real-time, dodging EDR tools. Agents inherit user sessions, blending attacks into legit traffic.
    • Real-World Example: Menlo Security: LLMs craft keyloggers that evolve on — the-fly. No employee training applies — agents just obey prompts.
    • Potential Impact: Enterprise-wide compromise; “weakest link” shifts from humans to AI.
Resource & Usability Glitches
    • Description: Sloppy AI integration drains resources, causing lags that invite errors, or over-permissions that expose files/systems.
    • Real-World Example: Kaspersky notes AI browsers’ broad file access + social engineering susceptibility.
    • Potential Impact: Indirect risks like overlooked threats during freezes.

These aren’t hypotheticals — 2025 saw Brave, Anthropic, and Lasso Security publish exploits showing AI browsers tricked into bank drains or credential theft via Reddit-like sites.

Recently, a user over on Twitter warned that Comet could “drain your bank account” via injected prompts, echoing expert calls for “security before convenience.”

The Rush to Agentic AI

September 2025 marks a tipping point. Google’s Gemini rollout to Chrome started mid-month, while Perplexity’s Comet updates (post-vulnerability patches) hit headlines. A Forbes piece just two days ago blasted agentic browsers as an “institutional security breach” risk for education, citing credential inheritance and phishing doors. Meanwhile, CTech warned on Sept 22 that these tools could “make browsing far riskier” without guardrails.

Cybercriminals are adapting fast: AI-evolved malware variants are up, per Menlo Security, exploiting browsers as the “gateway to the digital landscape.”

Dodge the Nightmare

You shouldn’t assign AI browsers to the rubbish heap entirely — they’re transformative for workflows. But treat them like a loaded gun: Handle with care.

    • Vet & Update Ruthlessly: Stick to reputable ones (e.g., Brave Leo over unpatched betas). Enable auto-updates for patches — Perplexity fixed Comet’s flaws after Brave’s report
    • Layer Defenses: Use multi-factor auth (MFA) everywhere, monitor logs for odd activity, and deploy tools like SquareX or LayerX to block risky extensions/permissions. For orgs, enforce policies assessing AI extension risks — 1Password calls this a “must” since no tool is risk-free.
    • Prompt Smartly & Confirm Actions: Phrase queries to reinforce safety (e.g., “Summarize without acting”). Always confirm sensitive tasks — Anthropic mandates user prompts for emails or logins.
    • Go Incognito for Sensitive Stuff: Log out of high-stakes sessions (banking, email) before AI tasks. Kaspersky recommends browsers with proven AI testing.
    • Stay Informed: Follow sources like Brave’s blog or X threads on #AIBrowsers for fresh exploits. Tools like Cloaked warn: One breach scales to thousands.

In short, AI browsers could revolutionize the web — or reduce your bank balance to zero while you sip coffee. The tech’s too new for foolproof safety, but with vigilance, you can harness the power without the peril.