Emirates launches limited flights into Dubai

The years Ramadan fell in May

1987

1954

1921

1888

Draw for Europa League last-16

Istanbul Basaksehir v Copenhagen; Olympiakos Piraeus v Wolverhampton Wanderers

Rangers v Bayer Leverkusen; VfL Wolfsburg v Shakhtar Donetsk; Inter Milan v Getafe

Sevilla v AS Roma; Eintracht Frankfurt or Salzburg v Basel; LASK v Manchester United

Kanguva
Director: Siva
Stars: Suriya, Bobby Deol, Disha Patani, Yogi Babu, Redin Kingsley
Rating: 2/5
 
Citadel: Honey Bunny first episode

Directors: Raj & DK

Stars: Varun Dhawan, Samantha Ruth Prabhu, Kashvi Majmundar, Kay Kay Menon

Rating: 4/5

UAE currency: the story behind the money in your pockets
Know your cyber adversaries

Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.

Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.

Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.

Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.

Phishing: Aims to secure personal information, such as passwords and credit card numbers.

Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.

Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.

Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.

Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.

Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.

Zero-day exploit: Exploits a vulnerability in software before a fix is found.

Updated: June 10, 2021, 10:00 PM