More from The National:
Which countries are hosting events at Expo 2020 Dubai before it ends?
50 things to do at Expo 2020 Dubai before it ends on March 31
Expo 2020 Dubai: how to beat the queues
20 concerts to attend at Expo 2020 Dubai before it ends: from SB19 to Googoosh
10 unusual and authentic dishes to try at Expo 2020 Dubai before it ends
The specs
Engine: 2-litre or 3-litre 4Motion all-wheel-drive Power: 250Nm (2-litre); 340 (3-litre) Torque: 450Nm Transmission: 8-speed automatic Starting price: From Dh212,000 On sale: Now
If you go
From Zero
Artist: Linkin Park
Label: Warner Records
Number of tracks: 11
Rating: 4/5
Women & Power: A Manifesto
Mary Beard
Profile Books and London Review of Books
COMPANY PROFILE
The%20specs%3A%20Taycan%20Turbo%20GT
Know your cyber adversaries
Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.
Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.
Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.
Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.
Phishing: Aims to secure personal information, such as passwords and credit card numbers.
Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.
Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.
Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.
Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.
Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.
Zero-day exploit: Exploits a vulnerability in software before a fix is found.