Tunisian workshop produces handbags as tourists return - in pictures


  • English
  • Arabic

More from The National:

Orthopaedic surgeons offer Gaza's injured animals a new lifeline - in pictures

Egyptian percussionists give ancient instrument a new lease of life - in pictures

Egypt's first female analog astronaut on simulating space exploration

Nayla Al Baloushi becomes first Emirati woman to scale Mount Everest

Old Apple products displayed at warehouse in Dubai – in pictures

Know your cyber adversaries

Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.

Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.

Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.

Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.

Phishing: Aims to secure personal information, such as passwords and credit card numbers.

Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.

Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.

Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.

Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.

Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.

Zero-day exploit: Exploits a vulnerability in software before a fix is found.

UAE currency: the story behind the money in your pockets
Updated: May 28, 2022, 12:19 PM`