On today's update, we have the latest coronavirus figures, the UAE urges the public to follow safety measures and gyms are to reopen in Abu Dhabi.
Etihad is increasing its service by nine more destinations, Egypt gets a $5.2 billion (Dh19.1bn) loan from the IMF and Saudi Arabia says it forced three Iranian boats out of its waters.
Faisal Salah will join us for what's trending including Israeli annexation, Glastonbury and Manchester United.
Singham Again
Director: Rohit Shetty
Stars: Ajay Devgn, Kareena Kapoor Khan, Ranveer Singh, Akshay Kumar, Tiger Shroff, Deepika Padukone
Rating: 3/5
Cricket World Cup League 2
UAE squad
Rahul Chopra (captain), Aayan Afzal Khan, Ali Naseer, Aryansh Sharma, Basil Hameed, Dhruv Parashar, Junaid Siddique, Muhammad Farooq, Muhammad Jawadullah, Muhammad Waseem, Omid Rahman, Rahul Bhatia, Tanish Suri, Vishnu Sukumaran, Vriitya Aravind
Fixtures
Friday, November 1 – Oman v UAE
Sunday, November 3 – UAE v Netherlands
Thursday, November 7 – UAE v Oman
Saturday, November 9 – Netherlands v UAE
COMPANY PROFILE
COMPANY%20PROFILE
Company%20Profile
Abu Dhabi traffic facts
Drivers in Abu Dhabi spend 10 per cent longer in congested conditions than they would on a free-flowing road
The highest volume of traffic on the roads is found between 7am and 8am on a Sunday.
Travelling before 7am on a Sunday could save up to four hours per year on a 30-minute commute.
The day was the least congestion in Abu Dhabi in 2019 was Tuesday, August 13.
The highest levels of traffic were found on Sunday, November 10.
Drivers in Abu Dhabi lost 41 hours spent in traffic jams in rush hour during 2019
Disclaimer
Director: Alfonso Cuaron
Stars: Cate Blanchett, Kevin Kline, Lesley Manville
Rating: 4/5
COMPANY PROFILE
COMPANY%20PROFILE%20
Know your cyber adversaries
Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.
Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.
Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.
Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.
Phishing: Aims to secure personal information, such as passwords and credit card numbers.
Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.
Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.
Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.
Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.
Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.
Zero-day exploit: Exploits a vulnerability in software before a fix is found.