If found guilty of breaking Covid-19 rules and intentionally endangering public health, the men could be jailed. Pawan Singh / The National
If found guilty of breaking Covid-19 rules and intentionally endangering public health, the men could be jailed. Pawan Singh / The National
If found guilty of breaking Covid-19 rules and intentionally endangering public health, the men could be jailed. Pawan Singh / The National
If found guilty of breaking Covid-19 rules and intentionally endangering public health, the men could be jailed. Pawan Singh / The National

Man with Covid-19 'wandered around Abu Dhabi and friend posted footage online'


  • English
  • Arabic

Authorities in Abu Dhabi have detained two men after footage appeared online of a man wandering around the city showing a positive Covid-19 test result.

One of the men being held is alleged to have been walking in a public place while revealing a positive coronavirus test result on his phone.

The other man is alleged have filmed him and published the footage on social media.

Abu Dhabi Judicial Department on Saturday said both had been detained pending further investigations by Public Prosecution on charges of endangering the health of others and breaching measures to limit the spread of Covid-19.

The Authorities said everyone must follow rules designed to safeguard public health, and anyone who did not would face legal action.

Article 348 of the UAE's Federal Penal Code states anyone who intentionally commits an act that endangers people's lives, health, security or freedoms faces jail, a fine – or both.

Authorities have taken strict action against people breaking Covid-19 rules.

Shops have been warned, tour operators fined and people penalised for failing to wear a mask.

War and the virus
Specs

Engine: Duel electric motors
Power: 659hp
Torque: 1075Nm
On sale: Available for pre-order now
Price: On request

UAE currency: the story behind the money in your pockets
Story%20behind%20the%20UAE%20flag
%3Cp%3EThe%20UAE%20flag%20was%20first%20unveiled%20on%20December%202%2C%201971%2C%20the%20day%20the%20UAE%20was%20formed.%C2%A0%3C%2Fp%3E%0A%3Cp%3EIt%20was%20designed%20by%20Abdullah%20Mohammed%20Al%20Maainah%2C%2019%2C%20an%20Emirati%20from%20Abu%20Dhabi.%C2%A0%3C%2Fp%3E%0A%3Cp%3EMr%20Al%20Maainah%20said%20in%20an%20interview%20with%20%3Cem%3EThe%20National%3C%2Fem%3E%20in%202011%20he%20chose%20the%20colours%20for%20local%20reasons.%C2%A0%3C%2Fp%3E%0A%3Cp%3EThe%20black%20represents%20the%20oil%20riches%20that%20transformed%20the%20UAE%2C%20green%20stands%20for%20fertility%20and%20the%20red%20and%20white%20colours%20were%20drawn%20from%20those%20found%20in%20existing%20emirate%20flags.%3C%2Fp%3E%0A
UAE currency: the story behind the money in your pockets
The 12 Syrian entities delisted by UK 

Ministry of Interior
Ministry of Defence
General Intelligence Directorate
Air Force Intelligence Agency
Political Security Directorate
Syrian National Security Bureau
Military Intelligence Directorate
Army Supply Bureau
General Organisation of Radio and TV
Al Watan newspaper
Cham Press TV
Sama TV

COMPANY PROFILE
Name: Kumulus Water
 
Started: 2021
 
Founders: Iheb Triki and Mohamed Ali Abid
 
Based: Tunisia 
 
Sector: Water technology 
 
Number of staff: 22 
 
Investment raised: $4 million 
Know your cyber adversaries

Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.

Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.

Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.

Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.

Phishing: Aims to secure personal information, such as passwords and credit card numbers.

Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.

Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.

Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.

Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.

Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.

Zero-day exploit: Exploits a vulnerability in software before a fix is found.

Moon Music

Artist: Coldplay

Label: Parlophone/Atlantic

Number of tracks: 10

Rating: 3/5