A herd of cattle is seen stranded by floodwaters following heavy rainfall in Jian, Jiangxi province, China.  Reuters

World in focus - best photos for June 13, 2019



More galleries from The National:

Sheikh Mohamed bin Zayed's Germany visit

Netflix series 'Jinn' launches at red carpet event in Jordan

Aston Martin's new Dh30 million ride unveiled at Le Mans

Cyclone Vayu veers away from India's west coast

COMPANY%20PROFILE%20
%3Cp%3E%3Cstrong%3EName%3A%3C%2Fstrong%3E%20Haltia.ai%0D%3Cbr%3E%3Cstrong%3EStarted%3A%3C%2Fstrong%3E%202023%0D%3Cbr%3E%3Cstrong%3ECo-founders%3A%3C%2Fstrong%3E%20Arto%20Bendiken%20and%20Talal%20Thabet%0D%3Cbr%3E%3Cstrong%3EBased%3A%3C%2Fstrong%3E%20Dubai%2C%20UAE%0D%3Cbr%3E%3Cstrong%3EIndustry%3A%3C%2Fstrong%3E%20AI%0D%3Cbr%3E%3Cstrong%3ENumber%20of%20employees%3A%3C%2Fstrong%3E%2041%0D%3Cbr%3E%3Cstrong%3EFunding%3A%3C%2Fstrong%3E%20About%20%241.7%20million%0D%3Cbr%3E%3Cstrong%3EInvestors%3A%3C%2Fstrong%3E%20Self%2C%20family%20and%20friends%26nbsp%3B%3C%2Fp%3E%0A
SPECS

Engine: 4-litre V8 twin-turbo
Power: 630hp
Torque: 850Nm
Transmission: 8-speed Tiptronic automatic
Price: From Dh599,000
On sale: Now

ASHES SCHEDULE

First Test
November 23-27 (The Gabba, Brisbane)
Second Test
December 2-6 (Adelaide Oval, Adelaide)
Third Test
December 14-18 (Waca Ground, Perth)
Fourth Test
December 26-30 (Melbourne Cricket Ground, Melbourne)
Fifth Test
January 4-8, 2018 (Sydney Cricket Ground, Sydney)

Famous left-handers

- Marie Curie

- Jimi Hendrix

- Leonardo Di Vinci

- David Bowie

- Paul McCartney

- Albert Einstein

- Jack the Ripper

- Barack Obama

- Helen Keller

- Joan of Arc

Know your cyber adversaries

Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.

Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.

Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.

Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.

Phishing: Aims to secure personal information, such as passwords and credit card numbers.

Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.

Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.

Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.

Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.

Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.

Zero-day exploit: Exploits a vulnerability in software before a fix is found.