Abu Dhabi UFC, Ruler of Dubai meets 7-year-old fan, women feel safer in UAE - Trending



Trending Middle East brings you the latest social media and search trends from the Middle East and around the world.

On today's episode, the UAE tops a list of places women feel safest, and a seven-year-old girl gets her wish to meet Sheikh Mohammed bin Rashid, the Vice President and Ruler of Dubai.

Glover Teixeira, 42, wins UFC 267 in Abu Dhabi to become the second oldest champion in UFC history and Gulf nations withdraw their envoys from Beirut after pro-Houthi comments were made by a Lebanese minister.

Key facilities
  • Olympic-size swimming pool with a split bulkhead for multi-use configurations, including water polo and 50m/25m training lanes
  • Premier League-standard football pitch
  • 400m Olympic running track
  • NBA-spec basketball court with auditorium
  • 600-seat auditorium
  • Spaces for historical and cultural exploration
  • An elevated football field that doubles as a helipad
  • Specialist robotics and science laboratories
  • AR and VR-enabled learning centres
  • Disruption Lab and Research Centre for developing entrepreneurial skills
Know your cyber adversaries

Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.

Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.

Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.

Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.

Phishing: Aims to secure personal information, such as passwords and credit card numbers.

Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.

Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.

Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.

Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.

Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.

Zero-day exploit: Exploits a vulnerability in software before a fix is found.

Updated: October 31, 2021, 6:50 AM

Middle East Today

The must read newsletter for the region

          By signing up, I agree to The National's privacy policy. This form is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
          Middle East Today