More from The National:
National Women's Day in Tunisia - in pictures
From the ground up: Emirates Palace, the hotel that introduced Abu Dhabi to the world
Three of the best new resorts in Bali: jungle villas, quiet retreats and Jumeirah luxury
Sheikh Mohammed and Sheikh Hamdan's London visit highlights enduring Dubai-UK relationship
THE BIO:
Favourite holiday destination: Thailand. I go every year and I’m obsessed with the fitness camps there.
Favourite book: Born to Run by Christopher McDougall. It’s an amazing story about barefoot running.
Favourite film: A League of their Own. I used to love watching it in my granny’s house when I was seven.
Personal motto: Believe it and you can achieve it.
TO A LAND UNKNOWN
Director: Mahdi Fleifel
Starring: Mahmoud Bakri, Aram Sabbah, Mohammad Alsurafa
Rating: 4.5/5
Farasan Boat: 128km Away from Anchorage
Director: Mowaffaq Alobaid
Stars: Abdulaziz Almadhi, Mohammed Al Akkasi, Ali Al Suhaibani
Rating: 4/5
If you go
The specs
Engine: 1.5-litre 4-cylinder petrol
Power: 154bhp
Torque: 250Nm
Transmission: 7-speed automatic with 8-speed sports option
Price: From Dh79,600
On sale: Now
Killing of Qassem Suleimani
National Editorial: Suleimani has been killed, now we must de-escalate
Mina Al Oraibi: Air strike casts a long shadow over the decade ahead
Jack Moore: Why the assassination is such a monumental gamble
Matthew Levitt: Iran retains its ability to launch terror attacks
Hussein Ibish: Trump's order on solid constitutional ground
Simon Waldman: Cautious Israel keeping a low profile
Know your cyber adversaries
Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.
Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.
Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.
Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.
Phishing: Aims to secure personal information, such as passwords and credit card numbers.
Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.
Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.
Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.
Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.
Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.
Zero-day exploit: Exploits a vulnerability in software before a fix is found.