Tottenham Hotspur ended a run of three successive Premier League defeats as Pierre-Emile Hojberg and a Matt Targett own goal secured a 2-1 home win over Aston Villa on Sunday.
It was a much-needed boost for a Tottenham side who have plummeted down the table since winning their first three games, easing the pressure on manager Nuno Espirito Santo.
Son Hueng-min failed to score for Tottenham but the industrious South Korean was the architect of their win.
It was his clever pass which allowed Danish midfielder Hojberg to open the scoring in the 27th minute and his brilliant run and cross towards Lucas Moura which ended with Targett getting the final touch in the 71st.
Villa had equalised when Ollie Watkins, recalled to the England squad this week, opened his league account for the season with a tap-in.
Victory lifted Tottenham to eighth place with 12 points while the end of Villa's three-match unbeaten league run left them 10th with 10 points.
In the photo gallery above, Jon Turner has provided the player ratings from the Tottenham Hotspur Stadium. To move on to the next photo click on the arrows or if using a mobile device, simply swipe.
Who's who in Yemen conflict
Houthis: Iran-backed rebels who occupy Sanaa and run unrecognised government
Yemeni government: Exiled government in Aden led by eight-member Presidential Leadership Council
Southern Transitional Council: Faction in Yemeni government that seeks autonomy for the south
Habrish 'rebels': Tribal-backed forces feuding with STC over control of oil in government territory
Know your cyber adversaries
Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.
Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.
Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.
Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.
Phishing: Aims to secure personal information, such as passwords and credit card numbers.
Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.
Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.
Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.
Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.
Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.
Zero-day exploit: Exploits a vulnerability in software before a fix is found.
Indika
%3Cp%3E%3Cstrong%3EDeveloper%3A%3C%2Fstrong%3E%2011%20Bit%20Studios%3Cbr%3E%3Cstrong%3EPublisher%3A%3C%2Fstrong%3E%20Odd%20Meter%3Cbr%3E%3Cstrong%3EConsole%3A%3C%2Fstrong%3E%20PlayStation%205%2C%20PC%20and%20Xbox%20series%20X%2FS%3Cbr%3E%3Cstrong%3ERating%3A%3C%2Fstrong%3E%204%2F5%3C%2Fp%3E%0A