Trending Middle East brings you the latest social media and search trends from the Middle East and around the world.
On today’s episode, people in the UAE woke up on Thursday to strong winds, thunder and lightning, with more wet weather expected through the day.
Flags will be flown at half-mast in the UAE as the country mourns Sheikh Tahnoon bin Mohammed, the Ruler’s Representative in Al Ain Region, who died on Wednesday, aged 82.
Campuses across the US are on edge after pro-Palestine protests at the University of California, Los Angeles turned violent and there were hundreds of arrests at Columbia University in New York.
Specs
Engine: Dual-motor all-wheel-drive electric
Range: Up to 610km
Power: 905hp
Torque: 985Nm
Price: From Dh439,000
Available: Now
A MINECRAFT MOVIE
Director: Jared Hess
Starring: Jack Black, Jennifer Coolidge, Jason Momoa
Rating: 3/5
'The Last Days of Ptolemy Grey'
Rating: 3/5
Directors: Ramin Bahrani, Debbie Allen, Hanelle Culpepper, Guillermo Navarro
Writers: Walter Mosley
Stars: Samuel L Jackson, Dominique Fishback, Walton Goggins
The White Lotus: Season three
Creator: Mike White
Starring: Walton Goggins, Jason Isaacs, Natasha Rothwell
Rating: 4.5/5
Know your cyber adversaries
Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.
Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.
Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.
Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.
Phishing: Aims to secure personal information, such as passwords and credit card numbers.
Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.
Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.
Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.
Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.
Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.
Zero-day exploit: Exploits a vulnerability in software before a fix is found.
The%20Letter%20Writer
%3Cp%3E%3Cstrong%3EDirector%3A%3C%2Fstrong%3E%20Layla%20Kaylif%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EStars%3A%3C%2Fstrong%3E%20Eslam%20Al%20Kawarit%2C%20Rosy%20McEwen%2C%20Muhammad%20Amir%20Nawaz%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3ERating%3A%3C%2Fstrong%3E%202%2F5%3C%2Fp%3E%0A