<?xml version="1.0" encoding="UTF-8"?>
<urlset
      xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
            http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">


<url>
  <loc>https://www.infysec.com/</loc>
  <lastmod>2018-09-21T09:43:56+00:00</lastmod>
  <priority>1.00</priority>
</url>
<url>
  <loc>https://www.infysec.com/sign-up</loc>
  <lastmod>2018-09-21T09:44:01+00:00</lastmod>
  <priority>0.50</priority>
</url>
<url>
  <loc>https://www.infysec.com/home/about-us</loc>
  <lastmod>2018-09-21T09:44:13+00:00</lastmod>
  <priority>0.50</priority>
</url>
<url>
  <loc>https://www.infysec.com/services</loc>
  <lastmod>2018-09-21T09:44:17+00:00</lastmod>
  <priority>1.00</priority>
</url>
<url>
  <loc>https://www.infysec.com/services/security-and-defense</loc>
  <lastmod>2018-09-21T09:44:22+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/services/security-and-defense/incident-response</loc>
  <lastmod>2018-09-21T09:44:26+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/services/security-and-defense/patch-management</loc>
  <lastmod>2018-09-21T09:44:30+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/services/security-and-defense/firewall-auditing</loc>
  <lastmod>2018-09-21T09:44:34+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/services/security-and-defense/website-security</loc>
  <lastmod>2018-09-21T09:44:39+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/services/security-and-defense/vulnerability-assessment</loc>
  <lastmod>2018-09-21T09:44:43+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/services/security-and-defense/penetration-testing</loc>
  <lastmod>2018-09-21T09:44:47+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/services/controls-and-assurances</loc>
  <lastmod>2018-09-21T09:44:52+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/services/controls-and-assurances/management-testing</loc>
  <lastmod>2018-09-21T09:44:56+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/services/controls-and-assurances/bcp-dr-services</loc>
  <lastmod>2018-09-21T09:45:00+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/services/controls-and-assurances/information-systems-audit</loc>
  <lastmod>2018-09-21T09:45:05+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/services/controls-and-assurances/rng-testing</loc>
  <lastmod>2018-09-21T09:45:09+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/services/controls-and-assurances/v-ciso</loc>
  <lastmod>2018-09-21T09:45:13+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/services/redteam-testing/iot-security-audit</loc>
  <lastmod>2018-09-21T09:45:18+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/services/redteam-testing/scada-security-audit</loc>
  <lastmod>2018-09-21T09:45:22+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/services/redteam-testing/android-security-audit</loc>
  <lastmod>2018-09-21T09:45:27+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/services/redteam-testing/ios-security-audit</loc>
  <lastmod>2018-09-21T09:45:31+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/services/redteam-testing/configuration-audit</loc>
  <lastmod>2018-09-21T09:45:35+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/services/redteam-testing/inventory-audit</loc>
  <lastmod>2018-09-21T09:45:40+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/services/redteam-testing/connected-car-security-audits</loc>
  <lastmod>2018-09-21T09:45:44+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/services/redteam-testing/cloud-security-audit</loc>
  <lastmod>2018-09-21T09:45:49+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training</loc>
  <lastmod>2018-09-21T09:45:53+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/ec-council</loc>
  <lastmod>2018-09-21T09:45:57+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/ec-council/certified-ethical-hacker</loc>
  <lastmod>2018-09-21T09:46:02+00:00</lastmod>
  <priority>1.00</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/ec-council/computer-hacking-forensic-investigator</loc>
  <lastmod>2018-09-21T09:46:07+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/ec-council/certified-secure-computer-user</loc>
  <lastmod>2018-09-21T09:46:12+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/ec-council/ecsa-lpt</loc>
  <lastmod>2018-09-21T09:46:16+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/ec-council/licensed-penetration-tester</loc>
  <lastmod>2018-09-21T09:46:21+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/comptia/security</loc>
  <lastmod>2018-09-21T09:46:25+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/comptia/cloud</loc>
  <lastmod>2018-09-21T09:46:29+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/comptia/network</loc>
  <lastmod>2018-09-21T09:46:34+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/comptia/pentest</loc>
  <lastmod>2018-09-21T09:46:38+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/e-learning-self-paced-courses</loc>
  <lastmod>2018-09-21T09:46:42+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/ism</loc>
  <lastmod>2018-09-21T09:46:46+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/ism/certified-information-systems-security-professional</loc>
  <lastmod>2018-09-21T09:46:51+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/ism/certified-information-security-manager</loc>
  <lastmod>2018-09-21T09:46:55+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/workshops</loc>
  <lastmod>2018-09-21T09:46:59+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/workshops/csi-cyber-scene-investigation-india</loc>
  <lastmod>2018-09-21T09:47:04+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/workshops/e-hack</loc>
  <lastmod>2018-09-21T09:47:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/workshops/apply-student-ambassador</loc>
  <lastmod>2018-09-21T09:47:13+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/courses</loc>
  <lastmod>2018-09-21T09:47:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/courses/certified-ethical-cracker</loc>
  <lastmod>2018-09-21T09:47:21+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/courses/advanced-web-application-penetration-testing</loc>
  <lastmod>2018-09-21T09:47:26+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/courses/network-packet-analysis</loc>
  <lastmod>2018-09-21T09:47:30+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/grc</loc>
  <lastmod>2018-09-21T09:47:34+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/grc/business-continuity-management-system</loc>
  <lastmod>2018-09-21T09:47:39+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/grc/certified-information-systems-auditor</loc>
  <lastmod>2018-09-21T09:47:43+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/grc/certified-business-continuity-professional</loc>
  <lastmod>2018-09-21T09:47:47+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/grc/sarbanes-oxley-act</loc>
  <lastmod>2018-09-21T09:47:52+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/grc/enterprise-risk-management</loc>
  <lastmod>2018-09-21T09:47:56+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/grc/payment-card-industry-data-security-standard</loc>
  <lastmod>2018-09-21T09:48:00+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/grc/health-insurance-portability-and-accountability-act</loc>
  <lastmod>2018-09-21T09:48:05+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/grc/information-technology-infrastructure-library</loc>
  <lastmod>2018-09-21T09:48:09+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/grc/it-service-management-systems</loc>
  <lastmod>2018-09-21T09:48:13+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/grc/control-objectives-for-information-and-related-technology</loc>
  <lastmod>2018-09-21T09:48:18+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/training/invite-for-guest-lecture</loc>
  <lastmod>2018-09-21T09:48:22+00:00</lastmod>
  <priority>0.60</priority>
</url>
<url>
  <loc>https://www.infysec.com/products</loc>
  <lastmod>2018-09-21T09:48:26+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/products/tools</loc>
  <lastmod>2018-09-21T09:48:31+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom</loc>
  <lastmod>2018-09-21T09:48:35+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog</loc>
  <lastmod>2018-09-21T09:48:39+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/workshop-photos</loc>
  <lastmod>2018-09-21T09:48:44+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/infysec-student-chapter</loc>
  <lastmod>2018-09-21T09:48:52+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/contact</loc>
  <lastmod>2018-09-21T09:48:56+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/event-details/ec-council/ecsa-certification-training</loc>
  <lastmod>2018-09-21T09:49:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/event-details/ec-council/certified-ethical-hacker-ceh-09-15-2018</loc>
  <lastmod>2018-09-21T09:49:05+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/event-details/ec-council/certified-ethical-hacker-ceh-09-29-2018</loc>
  <lastmod>2018-09-21T09:49:09+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/wikileaks-private-message-exposed</loc>
  <lastmod>2018-09-21T09:49:13+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/security/wannacry-analysis</loc>
  <lastmod>2018-09-21T09:49:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/security/oracle-is-facing-a-tough-time</loc>
  <lastmod>2018-09-21T09:49:21+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/yes-the-first-ever-website-went-live-25-years-ago</loc>
  <lastmod>2018-09-21T09:49:26+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/joomla-anti-hacking-tips</loc>
  <lastmod>2018-09-21T09:49:30+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.infysec.com/infysec-team-members/team/1</loc>
  <lastmod>2018-09-21T09:49:42+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/infysec-team-members/team/2</loc>
  <lastmod>2018-09-21T09:49:46+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/content/others</loc>
  <lastmod>2018-09-21T09:50:52+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/author/1679-vinodsenthilt</loc>
  <lastmod>2018-09-21T09:50:56+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/content/security-testing</loc>
  <lastmod>2018-09-21T09:51:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/your-smartphone-battery-status-is-enough-to-trace-you</loc>
  <lastmod>2018-09-21T09:51:14+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/even-clinton-s-campaign-isnt-safe</loc>
  <lastmod>2018-09-21T09:51:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/brazillian-prosecutor-holds-facebooks-funds</loc>
  <lastmod>2018-09-21T09:51:23+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/now-its-safe</loc>
  <lastmod>2018-09-21T09:51:27+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/yes-attacks-are-everywhere</loc>
  <lastmod>2018-09-21T09:51:31+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/iphone-7-new-design-in-market</loc>
  <lastmod>2018-09-21T09:51:35+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/us-court-gives-green-signal-to-google-now-handing-over-of-overseas-data-isn-t-in-demand-part-2</loc>
  <lastmod>2018-09-21T09:51:40+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/us-court-gives-green-signal-to-google-now-handing-over-of-overseas-data-isn-t-in-demand-part-1</loc>
  <lastmod>2018-09-21T09:51:44+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/putin-declares-it-to-be-a-dark-day-for-russia-after-introducing-surveillance-measures-into-law</loc>
  <lastmod>2018-09-21T09:51:48+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/workshop-photos/category/2-ehack-chennai</loc>
  <lastmod>2018-09-21T09:52:33+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/workshop-photos/category/3-ehack-coimbatore</loc>
  <lastmod>2018-09-21T09:52:37+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/workshop-photos/category/4-ehack-srm</loc>
  <lastmod>2018-09-21T09:52:42+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/workshop-photos/category/5-ehack-trichy</loc>
  <lastmod>2018-09-21T09:52:46+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/workshop-photos/category/6-proved-moments</loc>
  <lastmod>2018-09-21T09:52:50+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/event-details</loc>
  <lastmod>2018-09-21T09:52:55+00:00</lastmod>
  <priority>1.00</priority>
</url>
<url>
  <loc>https://www.infysec.com/event-details/infysec/view-map?tmpl=component&amp;format=html</loc>
  <lastmod>2018-09-21T09:52:59+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/event-details/ecsa-certification-training/individual-registration</loc>
  <lastmod>2018-09-21T09:53:04+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/event-details/ecsa-certification-training/invite-friend?tmpl=component</loc>
  <lastmod>2018-09-21T09:53:11+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/event-details/certified-ethical-hacker-ceh-09-15-2018/individual-registration</loc>
  <lastmod>2018-09-21T09:53:16+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/event-details/certified-ethical-hacker-ceh-09-15-2018/invite-friend?tmpl=component</loc>
  <lastmod>2018-09-21T09:53:23+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/event-details/certified-ethical-hacker-ceh-09-29-2018/individual-registration</loc>
  <lastmod>2018-09-21T09:53:27+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/event-details/certified-ethical-hacker-ceh-09-29-2018/invite-friend?tmpl=component</loc>
  <lastmod>2018-09-21T09:53:36+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/itemlist</loc>
  <lastmod>2018-09-21T09:53:42+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/tag/wannacry</loc>
  <lastmod>2018-09-21T09:53:46+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/tag/ransomware</loc>
  <lastmod>2018-09-21T09:53:54+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/tag/malware</loc>
  <lastmod>2018-09-21T09:53:58+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/tag/worm</loc>
  <lastmod>2018-09-21T09:54:03+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/tag/virus</loc>
  <lastmod>2018-09-21T09:54:08+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/security/identity-theft-turns-its-mode-to-pan-numbers</loc>
  <lastmod>2018-09-21T09:54:13+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/even-atm-pin-in-smartwatch-isnt-secure-now</loc>
  <lastmod>2018-09-21T09:54:27+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/this-time-its-twitter-ceo-s-account</loc>
  <lastmod>2018-09-21T09:54:32+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/security/dma-locker-virus-being-locked-without-information-is-dangerous-than-encryption</loc>
  <lastmod>2018-09-21T09:55:14+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/security/ransomware-hit-israeli-electricity-authority-power-grid-not-affected</loc>
  <lastmod>2018-09-21T09:55:19+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/security/caution-phishing-attacks-can-be-launched-against-ebay-visitors</loc>
  <lastmod>2018-09-21T09:55:23+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/security/three-flaws-in-nginx-resolver</loc>
  <lastmod>2018-09-21T09:55:27+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/security/e-commerce-platform-may-fall-prey-to-hackers-critical-bug-in-magento</loc>
  <lastmod>2018-09-21T09:55:31+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/security/escape-your-website-from-hackers-eyes</loc>
  <lastmod>2018-09-21T09:55:36+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/security/asacub-trojan-from-small-hole-to-big-drain</loc>
  <lastmod>2018-09-21T09:55:40+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/security/advanced-generation-kali-linux-rolling-released</loc>
  <lastmod>2018-09-21T09:55:44+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/security/don-t-be-headlined-as-a-hackers-playground</loc>
  <lastmod>2018-09-21T09:55:49+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/ibm-brings-up-qunatum-computing</loc>
  <lastmod>2018-09-21T09:56:53+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/it-can-be-tough-too-as-hackers-asked-for-1-million-for-cracking-ios-9</loc>
  <lastmod>2018-09-21T09:56:58+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/china-hits-a-wonder-again-owner-of-the-most-powerful-supercomputer</loc>
  <lastmod>2018-09-21T09:57:03+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/272-million-passwords-at-just-a-cost-of-1</loc>
  <lastmod>2018-09-21T09:57:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/china-seems-to-be-a-favourable-market</loc>
  <lastmod>2018-09-21T09:57:12+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/apple-is-upto-block-your-phone-camera-remotely-patents-filed</loc>
  <lastmod>2018-09-21T09:57:17+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/privacy-posts-on-facebook-is-just-a-hoax</loc>
  <lastmod>2018-09-21T09:57:21+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/android-s-n-is-in-market</loc>
  <lastmod>2018-09-21T09:57:25+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/narrow-slices-of-iphone-supports-hacking-fbi-director-says</loc>
  <lastmod>2018-09-21T09:57:30+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/encrypt-your-text-and-calls-with-these-apps</loc>
  <lastmod>2018-09-21T09:57:34+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/10-best-android-hacking-tools</loc>
  <lastmod>2018-09-21T09:57:40+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/samsung-says-its-safe</loc>
  <lastmod>2018-09-21T09:57:45+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/its-easier-and-smarter-now-google-2-factor-authentication</loc>
  <lastmod>2018-09-21T09:57:54+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/unencrypted-kernel-code-oopse-apple-left-it-intentionaly</loc>
  <lastmod>2018-09-21T09:57:59+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/star-wars-yes-here-it-goes-live-battlefront-bespin-dlc</loc>
  <lastmod>2018-09-21T09:58:03+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/even-zuckerberg-feels-unsafe-photos-revealed-his-taped-webcam-and-microphone</loc>
  <lastmod>2018-09-21T09:58:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/an-android-a-day-can-help-you-hack-facebook-account-in-a-way</loc>
  <lastmod>2018-09-21T09:58:12+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/this-may-happen-to-your-github-account-too</loc>
  <lastmod>2018-09-21T09:58:17+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/the-pirate-bay-alleged-for-a-fine-that-it-doesn-t-know-about</loc>
  <lastmod>2018-09-21T09:58:21+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/bad-time-hackers-facebook-fixes-the-bug-that-let-hackers-delete-chat-history</loc>
  <lastmod>2018-09-21T09:58:25+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/instagram-server-hacked-woah-researchers-did-this-too</loc>
  <lastmod>2018-09-21T09:58:30+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/instagram-happens-to-earn-10k-facebook-bug-bounty-for-a-10-years-boy</loc>
  <lastmod>2018-09-21T09:58:35+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/facebook-s-is-yet-again-in-trouble-for-viewing-private-messages</loc>
  <lastmod>2018-09-21T09:58:40+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/swift-knocks-the-banks-with-a-new-set-of-instructions-to-screw-hackers</loc>
  <lastmod>2018-09-21T09:58:44+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/drone-tracker</loc>
  <lastmod>2018-09-21T09:58:50+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/fake-chargers-can-be-risky</loc>
  <lastmod>2018-09-21T09:58:54+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/allo-to-soon-hit-the-market-google-s-chatting-app</loc>
  <lastmod>2018-09-21T09:58:59+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/linkedin-passwords-for-sale</loc>
  <lastmod>2018-09-21T09:59:04+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/facebook-vs-twitter-race-continues</loc>
  <lastmod>2018-09-21T09:59:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/firefox-users-existing-on-this-earth-please-update-before-files-get-stolen</loc>
  <lastmod>2018-09-21T09:59:12+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/bad-hacker-days-phone-vulnerabilities-for-easy-hacking</loc>
  <lastmod>2018-09-21T09:59:17+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/digital-currency-firm-founders-to-be-behind-the-bars-for-20-years</loc>
  <lastmod>2018-09-21T09:59:21+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/are-movie-true-can-your-phone-really-be-tracked</loc>
  <lastmod>2018-09-21T09:59:26+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/qualcomm-flaws-to-hit-damages-to-android</loc>
  <lastmod>2018-09-21T09:59:30+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/fbi-to-get-more-rights-hacking-allowed-by-us-supreme-court</loc>
  <lastmod>2018-09-21T09:59:34+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/child-pornography-seems-a-bigger-trouble-for-hill-than-expected</loc>
  <lastmod>2018-09-21T09:59:39+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/cyber-security-woes</loc>
  <lastmod>2018-09-21T09:59:43+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/sony-has-better-plans-for-its-playstation</loc>
  <lastmod>2018-09-21T09:59:48+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/facebook-android-app-now-with-internet-anonymity-tor</loc>
  <lastmod>2018-09-21T09:59:52+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/encryption-is-the-hottest-topic-top-5-messenger-software</loc>
  <lastmod>2018-09-21T09:59:57+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/source-codes-china-s-request-receives-a-denial-from-apple</loc>
  <lastmod>2018-09-21T10:00:04+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/blue-screen-of-deathqr-codes-look-sensible-now</loc>
  <lastmod>2018-09-21T10:00:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/what-s-going-on-now-apple-wants-fbi-s-help-to-hack-its-gadgets-sounds-like-a-lol</loc>
  <lastmod>2018-09-21T10:00:13+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/end-to-end-encryption-seems-to-be-a-catch</loc>
  <lastmod>2018-09-21T10:00:17+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/did-ssl-industry-log-in-some-changes-really</loc>
  <lastmod>2018-09-21T10:00:22+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/decrypt-petya-ransomware-today</loc>
  <lastmod>2018-09-21T10:00:26+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/amzon-needs-to-know-cctv-cameras-have-malware</loc>
  <lastmod>2018-09-21T10:00:30+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/launch-of-new-swift-programming-language</loc>
  <lastmod>2018-09-21T10:00:35+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/pick-your-web-developer-wisely</loc>
  <lastmod>2018-09-21T10:00:40+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/make-space-for-the-traditional-patters-of-testing</loc>
  <lastmod>2018-09-21T10:00:44+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/serm-tips-to-make-your-life-easier</loc>
  <lastmod>2018-09-21T10:00:50+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/online-reputation-management-remote-team-at-work</loc>
  <lastmod>2018-09-21T10:00:55+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/penetration-testing-a-need-not-a-utility</loc>
  <lastmod>2018-09-21T10:00:59+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/top-writing-hacks-by-inspiring-writers</loc>
  <lastmod>2018-09-21T10:01:05+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/make-it-look-the-best</loc>
  <lastmod>2018-09-21T10:01:09+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/success-determinants-get-it-right-from-start</loc>
  <lastmod>2018-09-21T10:01:14+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/tools-to-ensure-security-perfection</loc>
  <lastmod>2018-09-21T10:01:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/security-testing-answer-to-major-issues</loc>
  <lastmod>2018-09-21T10:01:23+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/cyber-security-a-rising-issue</loc>
  <lastmod>2018-09-21T10:01:28+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/make-each-step-secure-with-security-testing</loc>
  <lastmod>2018-09-21T10:01:33+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/security-testing-at-the-highest-rise</loc>
  <lastmod>2018-09-21T10:01:37+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/cyber-security-a-myth-or-reality</loc>
  <lastmod>2018-09-21T10:01:41+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/let-people-know-your-presence</loc>
  <lastmod>2018-09-21T10:01:45+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/make-sure-you-play-smart-on-web</loc>
  <lastmod>2018-09-21T10:01:50+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/keep-penetration-testing-on-your-tips</loc>
  <lastmod>2018-09-21T10:01:54+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/dusk-till-dawn-brings-in-private-poker-room-wave</loc>
  <lastmod>2018-09-21T10:01:58+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/know-your-child-parenting-has-become-technological</loc>
  <lastmod>2018-09-21T10:02:03+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/new-bees-book-to-texas-hold-em-poker-its-on-line-too</loc>
  <lastmod>2018-09-21T10:02:07+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/world-series-full-house-pro-brings-in-its-flash</loc>
  <lastmod>2018-09-21T10:02:12+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/online-poker-games-on-the-table-of-us-legislative-federation</loc>
  <lastmod>2018-09-21T10:02:16+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/not-even-god-is-a-genius-of-ios-mobile-development-programmers-are</loc>
  <lastmod>2018-09-21T10:02:20+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/jphotolio-a-recommended-destination-for-photographers</loc>
  <lastmod>2018-09-21T10:02:25+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/inklings-for-a-better-cloud-hosting</loc>
  <lastmod>2018-09-21T10:02:30+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/advantages-of-digital-magazines</loc>
  <lastmod>2018-09-21T10:02:34+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/stream-up-your-portfolio-best-themes-for-wedding-photographers</loc>
  <lastmod>2018-09-21T10:02:39+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/irctc-s-content-marketing-battle-a-strategic-plan</loc>
  <lastmod>2018-09-21T10:02:43+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/cloud-servers-over-shared-and-dedicated-servers</loc>
  <lastmod>2018-09-21T10:02:47+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/should-your-content-bring-you-more-reactions-or-actions</loc>
  <lastmod>2018-09-21T10:02:52+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/business-is-meant-to-grow-emerging-need-of-accounting-software</loc>
  <lastmod>2018-09-21T10:02:56+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/newsroom/blog/others/girls-new-hands-on-gaming</loc>
  <lastmod>2018-09-21T10:03:00+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.infysec.com/event-details/ec-council/certified-ethical-hacker</loc>
  <lastmod>2018-09-21T10:03:05+00:00</lastmod>
  <priority>0.51</priority>
</url>

</urlset>
