Sheikh Abdullah bin Zayed, Minister of Foreign Affairs and International Co-operation, has spoken with UK Foreign Secretary Liz Truss in a phone call.
The ministers discussed the historic relations between the two countries, strategic co-operation, as well as ways to develop ties.
They exchanged views about the latest developments in the region and worldwide, and reviewed several international issues of common interest, UAE state news agency Wam said.
Sheikh Abdullah emphasised the long-standing relations between the two countries and the UAE's desire to strengthen and develop them.
Dunki
List of alleged parties
May 12, 2020: PM and his wife Carrie attend 'work meeting' with at least 17 staff
May 20, 2020: They attend 'bring your own booze party'
Nov 27, 2020: PM gives speech at leaving party for his staff
Dec 10, 2020: Staff party held by then-education secretary Gavin Williamson
Dec 13, 2020: PM and his wife throw a party
Dec 14, 2020: London mayoral candidate Shaun Bailey holds staff event at Conservative Party headquarters
Dec 15, 2020: PM takes part in a staff quiz
Dec 18, 2020: Downing Street Christmas party
Green ambitions
- Trees: 1,500 to be planted, replacing 300 felled ones, with veteran oaks protected
- Lake: Brown's centrepiece to be cleaned of silt that makes it as shallow as 2.5cm
- Biodiversity: Bat cave to be added and habitats designed for kingfishers and little grebes
- Flood risk: Longer grass, deeper lake, restored ponds and absorbent paths all meant to siphon off water
Emergency
Director: Kangana Ranaut
Stars: Kangana Ranaut, Anupam Kher, Shreyas Talpade, Milind Soman, Mahima Chaudhry
Rating: 2/5
CHELSEA SQUAD
Arrizabalaga, Bettinelli, Rudiger, Christensen, Silva, Chalobah, Sarr, Azpilicueta, James, Kenedy, Alonso, Jorginho, Kante, Kovacic, Saul, Barkley, Ziyech, Pulisic, Mount, Hudson-Odoi, Werner, Havertz, Lukaku.
Getting%20there%20
Know your cyber adversaries
Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.
Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.
Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.
Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.
Phishing: Aims to secure personal information, such as passwords and credit card numbers.
Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.
Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.
Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.
Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.
Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.
Zero-day exploit: Exploits a vulnerability in software before a fix is found.