Manchester United players celebrate with Bruno Fernandes after his opening goal penalty against Leicester City. PA
Manchester United players celebrate with Bruno Fernandes after his opening goal penalty against Leicester City. PA

Manchester United and Chelsea clinch top four on final day of Premier League season



Manchester United and Chelsea confirmed their participation in next season's Champions League after wins over Leicester City and Wolves respectively on the final day of the Premier League season.

Entering the final day in third, United needed to avoid defeat at fifth-placed Leicester, while Chelsea, in fourth, required a similar outcome at home against Wolves.

In the end it turned out to be quite comfortable as United clinched a 2-0 win at the King Power Stadium, while Chelsea secured their own 2-0 victory at Stamford Bridge thanks to quick-fire goals by Mason Mount and Olivier Giroud just before halftime.

Bruno Fernandes scored the all-important goal for United, slotting home from the penalty spot in the 71st minute, before Jesse Lingard capitalised on an error by Kasper Schmeichel deep in injury time.

More to follow

Disclaimer

Director: Alfonso Cuaron 

Stars: Cate Blanchett, Kevin Kline, Lesley Manville 

Rating: 4/5

Other ways to buy used products in the UAE

UAE insurance firm Al Wathba National Insurance Company (AWNIC) last year launched an e-commerce website with a facility enabling users to buy car wrecks.

Bidders and potential buyers register on the online salvage car auction portal to view vehicles, review condition reports, or arrange physical surveys, and then start bidding for motors they plan to restore or harvest for parts.

Physical salvage car auctions are a common method for insurers around the world to move on heavily damaged vehicles, but AWNIC is one of the few UAE insurers to offer such services online.

For cars and less sizeable items such as bicycles and furniture, Dubizzle is arguably the best-known marketplace for pre-loved.

Founded in 2005, in recent years it has been joined by a plethora of Facebook community pages for shifting used goods, including Abu Dhabi Marketplace, Flea Market UAE and Arabian Ranches Souq Market while sites such as The Luxury Closet and Riot deal largely in second-hand fashion.

At the high-end of the pre-used spectrum, resellers such as Timepiece360.ae, WatchBox Middle East and Watches Market Dubai deal in authenticated second-hand luxury timepieces from brands such as Rolex, Hublot and Tag Heuer, with a warranty.

COMPANY PROFILE
Name: Almnssa
Started: August 2020
Founder: Areej Selmi
Based: Gaza
Sectors: Internet, e-commerce
Investments: Grants/private funding
Company%20Profile
%3Cp%3E%3Cstrong%3ECompany%20name%3A%20%3C%2Fstrong%3ENamara%0D%3Cbr%3E%3Cstrong%3EStarted%3A%20%3C%2Fstrong%3EJune%202022%0D%3Cbr%3E%3Cstrong%3EFounder%3A%20%3C%2Fstrong%3EMohammed%20Alnamara%0D%3Cbr%3E%3Cstrong%3EBased%3A%20%3C%2Fstrong%3EDubai%20%0D%3Cbr%3E%3Cstrong%3ESector%3A%20%3C%2Fstrong%3EMicrofinance%0D%3Cbr%3E%3Cstrong%3ECurrent%20number%20of%20staff%3A%20%3C%2Fstrong%3E16%0D%3Cbr%3E%3Cstrong%3EInvestment%20stage%3A%20%3C%2Fstrong%3ESeries%20A%0D%3Cbr%3E%3Cstrong%3EInvestors%3A%20%3C%2Fstrong%3EFamily%20offices%0D%3Cbr%3E%3C%2Fp%3E%0A
Wicked
Director: Jon M Chu
Stars: Cynthia Erivo, Ariana Grande, Jonathan Bailey
Rating: 4/5
Know your cyber adversaries

Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.

Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.

Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.

Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.

Phishing: Aims to secure personal information, such as passwords and credit card numbers.

Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.

Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.

Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.

Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.

Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.

Zero-day exploit: Exploits a vulnerability in software before a fix is found.


Middle East Today

The must read newsletter for the region

      By signing up, I agree to The National's privacy policy
      Middle East Today