President Sheikh Mohamed. UAE Presidential Court
President Sheikh Mohamed. UAE Presidential Court
President Sheikh Mohamed. UAE Presidential Court
President Sheikh Mohamed. UAE Presidential Court

President Sheikh Mohamed receives call from Sudan's Gen Al Burhan


  • English
  • Arabic

President Sheikh Mohamed received a phone call on Friday from Gen Abdel Fattah Al Burhan, Chairman of Sudan's Transitional Sovereignty Council.

During the call, Sheikh Mohamed and Gen Al Burhan discussed relations between the two countries, as well as developments in Sudan and ways to support it in overcoming its current crisis, state news agency Wam reported.

Sheikh Mohamed pledged the UAE's commitment to supporting a solution for ending the crisis in Sudan in a way that enhances its stability and security, and brings development and prosperity for its people.

He stressed the importance of peaceful dialogue in preserving Sudan's security and stability, and expressed the UAE's continued commitment to supporting humanitarian efforts to ease the suffering of the Sudanese people.

Who's who in Yemen conflict

Houthis: Iran-backed rebels who occupy Sanaa and run unrecognised government

Yemeni government: Exiled government in Aden led by eight-member Presidential Leadership Council

Southern Transitional Council: Faction in Yemeni government that seeks autonomy for the south

Habrish 'rebels': Tribal-backed forces feuding with STC over control of oil in government territory

Know your cyber adversaries

Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.

Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.

Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.

Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.

Phishing: Aims to secure personal information, such as passwords and credit card numbers.

Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.

Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.

Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.

Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.

Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.

Zero-day exploit: Exploits a vulnerability in software before a fix is found.

Indika
%3Cp%3E%3Cstrong%3EDeveloper%3A%3C%2Fstrong%3E%2011%20Bit%20Studios%3Cbr%3E%3Cstrong%3EPublisher%3A%3C%2Fstrong%3E%20Odd%20Meter%3Cbr%3E%3Cstrong%3EConsole%3A%3C%2Fstrong%3E%20PlayStation%205%2C%20PC%20and%20Xbox%20series%20X%2FS%3Cbr%3E%3Cstrong%3ERating%3A%3C%2Fstrong%3E%204%2F5%3C%2Fp%3E%0A
While you're here
A general guide to how active you are:

Less than 5,000 steps - sedentary

5,000 - 9,999 steps - lightly active

10,000  - 12,500 steps - active

12,500 - highly active

PROFILE OF CURE.FIT

Started: July 2016

Founders: Mukesh Bansal and Ankit Nagori

Based: Bangalore, India

Sector: Health & wellness

Size: 500 employees

Investment: $250 million

Investors: Accel, Oaktree Capital (US); Chiratae Ventures, Epiq Capital, Innoven Capital, Kalaari Capital, Kotak Mahindra Bank, Piramal Group’s Anand Piramal, Pratithi Investment Trust, Ratan Tata (India); and Unilever Ventures (Unilever’s global venture capital arm)

BeIN Sports currently has the rights to show

- Champions League

- English Premier League

- Spanish Primera Liga 

- Italian, French and Scottish leagues

- Wimbledon and other tennis majors

- Formula One

- Rugby Union - Six Nations and European Cups

 

Test

Director: S Sashikanth

Cast: Nayanthara, Siddharth, Meera Jasmine, R Madhavan

Star rating: 2/5

Updated: July 18, 2024, 11:42 PM