Abu Dhabi residents enjoy the sunset along the Corniche on a Saturday evening. Victor Besa / The National

The Gulf today: Best photos for January 30, 2021



More galleries from The National:

Is David de Gea still the Premier League's best-paid player? The 60 highest salaries in England's top tier - in pictures

From Coachella to Ultra Music: major US music festivals face cancellation due to Covid-19

Australian Open to be allowed 30,000 fans a day

Our legal consultant

Name: Hassan Mohsen Elhais

Position: legal consultant with Al Rowaad Advocates and Legal Consultants.

Disclaimer

Director: Alfonso Cuaron 

Stars: Cate Blanchett, Kevin Kline, Lesley Manville 

Rating: 4/5

Citadel: Honey Bunny first episode

Directors: Raj & DK

Stars: Varun Dhawan, Samantha Ruth Prabhu, Kashvi Majmundar, Kay Kay Menon

Rating: 4/5

Nayanthara: Beyond The Fairy Tale

Starring: Nayanthara, Vignesh Shivan, Radhika Sarathkumar, Nagarjuna Akkineni

Director: Amith Krishnan

Rating: 3.5/5

Know your cyber adversaries

Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.

Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.

Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.

Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.

Phishing: Aims to secure personal information, such as passwords and credit card numbers.

Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.

Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.

Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.

Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.

Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.

Zero-day exploit: Exploits a vulnerability in software before a fix is found.

West Indies v India - Third ODI

India 251-4 (50 overs)
Dhoni (78*), Rahane (72), Jadhav (40)
Cummins (2-56), Bishoo (1-38)
West Indies 158 (38.1 overs)
Mohammed (40), Powell (30), Hope (24)
Ashwin (3-28), Yadav (3-41), Pandya (2-32)

India won by 93 runs

Company%20Profile
%3Cp%3E%3Cstrong%3ECompany%20name%3A%3C%2Fstrong%3E%20Cargoz%3Cbr%3E%3Cstrong%3EDate%20started%3A%3C%2Fstrong%3E%20January%202022%3Cbr%3E%3Cstrong%3EFounders%3A%3C%2Fstrong%3E%20Premlal%20Pullisserry%20and%20Lijo%20Antony%3Cbr%3E%3Cstrong%3EBased%3A%3C%2Fstrong%3E%20Dubai%3Cbr%3E%3Cstrong%3ENumber%20of%20staff%3A%3C%2Fstrong%3E%2030%3Cbr%3E%3Cstrong%3EInvestment%20stage%3A%3C%2Fstrong%3E%20Seed%3C%2Fp%3E%0A