More from The National:
Monday's best photos: from a Star Wars parade to London Landmarks marathon
Sunday's best photos: from wreck of largest aircraft to royal 'EastEnders' visit
Saturday's best photos: from Iraqi ballet dancers to Beijing window cleaners
Friday's best photos: from Sri Lankan unrest to the Walla Walla aurora - in pictures
Thursday's best photos: from the Las Vegas Grand Prix to pet portraits
Wednesday's best photos: form a rocket launch to a skateboard jump
COMPANY PROFILE
The specs
Engine: 2.0-litre four-cylinder turbo
Power: 268hp at 5,600rpm
Torque: 380Nm at 4,800rpm
Transmission: CVT auto
Fuel consumption: 9.5L/100km
On sale: now
Price: from Dh195,000
The specs
Engine: 1.5-litre 4-cylinder petrol
Power: 154bhp
Torque: 250Nm
Transmission: 7-speed automatic with 8-speed sports option
Price: From Dh79,600
On sale: Now
Company%20Profile
COMPANY%20PROFILE
COMPANY PROFILE
Nayanthara: Beyond The Fairy Tale
Starring: Nayanthara, Vignesh Shivan, Radhika Sarathkumar, Nagarjuna Akkineni
Director: Amith Krishnan
Rating: 3.5/5
From Zero
Artist: Linkin Park
Label: Warner Records
Number of tracks: 11
Rating: 4/5
COMPANY PROFILE
TO A LAND UNKNOWN
Director: Mahdi Fleifel
Starring: Mahmoud Bakri, Aram Sabbah, Mohammad Alsurafa
Rating: 4.5/5
If you go
Know your cyber adversaries
Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.
Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.
Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.
Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.
Phishing: Aims to secure personal information, such as passwords and credit card numbers.
Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.
Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.
Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.
Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.
Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.
Zero-day exploit: Exploits a vulnerability in software before a fix is found.
Sri Lanka-India Test series schedule
- 1st Test India won by 304 runs at Galle
- 2nd Test Thursday-Monday at Colombo
- 3rd Test August 12-16 at Pallekele
UAE - India ties
The UAE is India’s third-largest trade partner after the US and China
Annual bilateral trade between India and the UAE has crossed US$ 60 billion
The UAE is the fourth-largest exporter of crude oil for India
Indians comprise the largest community with 3.3 million residents in the UAE
Indian Prime Minister Narendra Modi first visited the UAE in August 2015
His visit on August 23-24 will be the third in four years
Sheikh Mohamed bin Zayed, Crown Prince of Abu Dhabi and Deputy Supreme Commander of the Armed Forces, visited India in February 2016
Sheikh Mohamed was the chief guest at India’s Republic Day celebrations in January 2017
Modi will visit Bahrain on August 24-25