Draw for Europa League last-16
Istanbul Basaksehir v Copenhagen;Â Olympiakos Piraeus v Wolverhampton Wanderers
Rangers v Bayer Leverkusen;Â VfL Wolfsburg v Shakhtar Donetsk;Â Inter Milan v Getafe
Sevilla v AS Roma;Â Eintracht Frankfurt or Salzburg v Basel;Â LASK v Manchester United
Kanguva
MORE ON INTERNATIONAL JUSTICE
Sudan at the ICC:Â Omar Al Bashir's trial is happening but what comes next?
Myanmar at the ICJ: ICJ issues ‘emergency measures’ ruling against Myanmar over Rohingya repression
Afghanistan at the ICC:Â Who will win as the US squares up for a fight with the ICC over Afghanistan?
Citadel: Honey Bunny first episode
Directors: Raj & DK
Stars: Varun Dhawan, Samantha Ruth Prabhu, Kashvi Majmundar, Kay Kay Menon
Rating: 4/5
Know your cyber adversaries
Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.
Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.
Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.
Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.
Phishing: Aims to secure personal information, such as passwords and credit card numbers.
Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.
Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.
Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.
Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.
Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.
Zero-day exploit: Exploits a vulnerability in software before a fix is found.