Mohammed bin Zayed Majlis
Singham Again
Director: Rohit Shetty
Stars: Ajay Devgn, Kareena Kapoor Khan, Ranveer Singh, Akshay Kumar, Tiger Shroff, Deepika Padukone
Rating: 3/5
UAE currency: the story behind the money in your pockets
COMPANY%20PROFILE%20
%3Cp%3E%3Cstrong%3ECompany%20name%3A%20%3C%2Fstrong%3EAlmouneer%3Cbr%3E%3Cstrong%3EStarted%3A%3C%2Fstrong%3E%202017%3Cbr%3E%3Cstrong%3EFounders%3A%3C%2Fstrong%3E%20Dr%20Noha%20Khater%20and%20Rania%20Kadry%3Cbr%3E%3Cstrong%3EBased%3A%20%3C%2Fstrong%3EEgypt%3Cbr%3E%3Cstrong%3ENumber%20of%20staff%3A%20%3C%2Fstrong%3E120%3Cbr%3E%3Cstrong%3EInvestment%3A%20%3C%2Fstrong%3EBootstrapped%2C%20with%20support%20from%20Insead%20and%20Egyptian%20government%2C%20seed%20round%20of%20%3Cbr%3E%243.6%20million%20led%20by%20Global%20Ventures%3Cbr%3E%3C%2Fp%3E%0A
Padmaavat
Director: Sanjay Leela Bhansali
Starring: Ranveer Singh, Deepika Padukone, Shahid Kapoor, Jim Sarbh
3.5/5
Company%20Profile
%3Cp%3E%3Cstrong%3ECompany%20name%3A%3C%2Fstrong%3E%20Cargoz%3Cbr%3E%3Cstrong%3EDate%20started%3A%3C%2Fstrong%3E%20January%202022%3Cbr%3E%3Cstrong%3EFounders%3A%3C%2Fstrong%3E%20Premlal%20Pullisserry%20and%20Lijo%20Antony%3Cbr%3E%3Cstrong%3EBased%3A%3C%2Fstrong%3E%20Dubai%3Cbr%3E%3Cstrong%3ENumber%20of%20staff%3A%3C%2Fstrong%3E%2030%3Cbr%3E%3Cstrong%3EInvestment%20stage%3A%3C%2Fstrong%3E%20Seed%3C%2Fp%3E%0A
FORSPOKEN
%3Cp%3EDeveloper%3A%20Luminous%20Productions%0D%3Cbr%3EPublisher%3A%20Square%20Enix%0D%3Cbr%3EConsole%3A%20PC%2C%20PS5%0D%3Cbr%3ERelease%20date%3A%20January%3C%2Fp%3E%0A
Company%20of%20Heroes%203
%3Cp%3EDeveloper%3A%20Relic%20Entertainment%3Cbr%3EPublisher%3A%20SEGA%3Cbr%3EConsole%3A%20PC%2C%20PS5%2C%20XSX%3Cbr%3ERelease%20date%3A%20February%3C%2Fp%3E%0A
Star%20Wars%20Jedi%3A%20Survivor
%3Cp%3EDeveloper%3A%20Respawn%20Entertainment%0D%3Cbr%3EPublisher%3A%20Electronic%20Arts%0D%3Cbr%3EConsole%3A%20PC%2C%20PS5%2C%20XSX%0D%3Cbr%3ERelease%20date%3A%20March%3C%2Fp%3E%0A
Suicide%20Squad%3A%20Kill%20the%20Justice%20League
%3Cp%3EDeveloper%3A%20Rocksteady%20Studios%0D%3Cbr%3EPublisher%3A%20Warner%20Bros%0D%3Cbr%3EConsole%3A%20PC%2C%20PS5%2C%20XSX%0D%3Cbr%3ERelease%20date%3A%20May%3C%2Fp%3E%0A
Final%20Fantasy%20XVI
%3Cp%3EDeveloper%3A%20Square%20Enix%0D%3Cbr%3EPublisher%3A%20Square%20Enix%0D%3Cbr%3EConsole%3A%20PS5%0D%3Cbr%3ERelease%20date%3A%20June%3C%2Fp%3E%0A
Street%20Fighter%206
%3Cp%3EDeveloper%3A%20Capcom%0D%3Cbr%3EPublisher%3A%20Capcom%0D%3Cbr%3EConsole%3A%20PS5%2C%20XSX%2C%20PC%0D%3Cbr%3ERelease%20date%3A%20June%3C%2Fp%3E%0A
Diablo%20IV
%3Cp%3EDeveloper%3A%20Blizzard%20Entertainment%0D%3Cbr%3EPublisher%3A%20Blizzard%20Entertainment%0D%3Cbr%3EConsole%3A%20PC%2C%20PS5%2C%20XSX%0D%3Cbr%3ERelease%20date%3A%20June%3C%2Fp%3E%0A
Baldur's%20Gate%203
%3Cp%3EDeveloper%3A%20Larian%20Studios%0D%3Cbr%3EPublisher%3A%20Larian%20Studios%0D%3Cbr%3EConsole%3A%20PC%0D%3Cbr%3ERelease%20date%3A%20August%3C%2Fp%3E%0A
The%20Legend%20of%20Zelda%3A%20Tears%20of%20The%20Kingdom
%3Cp%3EDeveloper%3A%20Nintendo%0D%3Cbr%3EPublisher%3A%20Nintendo%0D%3Cbr%3EConsole%3A%20Nintendo%20Switch%0D%3Cbr%3ERelease%20date%3A%20September%3C%2Fp%3E%0A
Marvel's%20Spider-Man%202
%3Cp%3EDeveloper%3A%20Insomniac%20Games%0D%3Cbr%3EPublisher%3A%20PlayStation%0D%3Cbr%3EConsole%3A%20PS5%0D%3Cbr%3ERelease%20date%3A%20Fall%3C%2Fp%3E%0A
Assassin's%20Creed%20Mirage
%3Cp%3EDeveloper%3A%20Ubisoft%0D%3Cbr%3EPublisher%3A%20Ubisoft%0D%3Cbr%3EConsole%3A%20PC%2C%20PS5%2C%20XSX%2C%20Amazon%20Luna%0D%3Cbr%3ERelease%20date%3A%202023%3C%2Fp%3E%0A
Starfield
%3Cp%3EDeveloper%3A%20Bethesda%20Game%20Studios%0D%3Cbr%3EPublisher%3A%20Bethesda%20Softworks%0D%3Cbr%3EConsole%3A%20PC%2C%20Xbox%0D%3Cbr%3ERelease%20date%3A%202023%3C%2Fp%3E%0A
Know your cyber adversaries
Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.
Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.
Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.
Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.
Phishing: Aims to secure personal information, such as passwords and credit card numbers.
Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.
Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.
Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.
Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.
Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.
Zero-day exploit: Exploits a vulnerability in software before a fix is found.
COMPANY PROFILE
Name: Qyubic
Started: October 2023
Founder: Namrata Raina
Based: Dubai
Sector: E-commerce
Current number of staff: 10
Investment stage: Pre-seed
Initial investment: Undisclosed
Three ways to limit your social media use
Clinical psychologist, Dr Saliha Afridi at The Lighthouse Arabia suggests three easy things you can do every day to cut back on the time you spend online.
1. Put the social media app in a folder on the second or third screen of your phone so it has to remain a conscious decision to open, rather than something your fingers gravitate towards without consideration.
2. Schedule a time to use social media instead of consistently throughout the day. I recommend setting aside certain times of the day or week when you upload pictures or share information.Â
3. Take a mental snapshot rather than a photo on your phone. Instead of sharing it with your social world, try to absorb the moment, connect with your feeling, experience the moment with all five of your senses. You will have a memory of that moment more vividly and for far longer than if you take a picture of it.