President Sheikh Mohamed received a phone call on Friday from Gen Abdel Fattah Al Burhan, Chairman of Sudan's Transitional Sovereignty Council.
During the call, Sheikh Mohamed and Gen Al Burhan discussed relations between the two countries, as well as developments in Sudan and ways to support it in overcoming its current crisis, state news agency Wam reported.
Sheikh Mohamed pledged the UAE's commitment to supporting a solution for ending the crisis in Sudan in a way that enhances its stability and security, and brings development and prosperity for its people.
He stressed the importance of peaceful dialogue in preserving Sudan's security and stability, and expressed the UAE's continued commitment to supporting humanitarian efforts to ease the suffering of the Sudanese people.
Who's who in Yemen conflict
Houthis: Iran-backed rebels who occupy Sanaa and run unrecognised government
Yemeni government: Exiled government in Aden led by eight-member Presidential Leadership Council
Southern Transitional Council: Faction in Yemeni government that seeks autonomy for the south
Habrish 'rebels': Tribal-backed forces feuding with STC over control of oil in government territory
Know your cyber adversaries
Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.
Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.
Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.
Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.
Phishing: Aims to secure personal information, such as passwords and credit card numbers.
Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.
Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.
Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.
Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.
Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.
Zero-day exploit: Exploits a vulnerability in software before a fix is found.
Indika
%3Cp%3E%3Cstrong%3EDeveloper%3A%3C%2Fstrong%3E%2011%20Bit%20Studios%3Cbr%3E%3Cstrong%3EPublisher%3A%3C%2Fstrong%3E%20Odd%20Meter%3Cbr%3E%3Cstrong%3EConsole%3A%3C%2Fstrong%3E%20PlayStation%205%2C%20PC%20and%20Xbox%20series%20X%2FS%3Cbr%3E%3Cstrong%3ERating%3A%3C%2Fstrong%3E%204%2F5%3C%2Fp%3E%0A
A general guide to how active you are:
Less than 5,000 steps - sedentary
5,000 - 9,999 steps - lightly active
10,000 - 12,500 steps - active
12,500 - highly active
PROFILE OF CURE.FIT
Started: July 2016
Founders: Mukesh Bansal and Ankit Nagori
Based: Bangalore, India
Sector: Health & wellness
Size: 500 employees
Investment: $250 million
Investors: Accel, Oaktree Capital (US); Chiratae Ventures, Epiq Capital, Innoven Capital, Kalaari Capital, Kotak Mahindra Bank, Piramal Group’s Anand Piramal, Pratithi Investment Trust, Ratan Tata (India); and Unilever Ventures (Unilever’s global venture capital arm)
BeIN Sports currently has the rights to show
- Champions League
- English Premier League
- Spanish Primera Liga
- Italian, French and Scottish leagues
- Wimbledon and other tennis majors
- Formula One
- Rugby Union - Six Nations and European Cups
Test
Director: S Sashikanth
Cast: Nayanthara, Siddharth, Meera Jasmine, R Madhavan
Star rating: 2/5