<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on 04.04.2026 at 00:07 by All in One SEO Pro v4.5.5 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://aboutinfosec.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>about InfoSec</title>
		<link><![CDATA[https://aboutinfosec.com]]></link>
		<description><![CDATA[about InfoSec]]></description>
		<lastBuildDate><![CDATA[Wed, 17 Apr 2024 15:44:21 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://aboutinfosec.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://aboutinfosec.com/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Wed, 17 Apr 2024 15:44:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/about/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/about/]]></link>
			<title>About</title>
			<pubDate><![CDATA[Wed, 15 Nov 2023 10:03:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/penci-block/footer/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/penci-block/footer/]]></link>
			<title>Footer</title>
			<pubDate><![CDATA[Wed, 15 Mar 2023 23:24:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/05/30/how-to-choose-the-best-hardware-2fa-tokens/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/05/30/how-to-choose-the-best-hardware-2fa-tokens/]]></link>
			<title>How to Choose the Best Hardware 2FA Tokens</title>
			<pubDate><![CDATA[Tue, 30 May 2023 22:14:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/03/03/otp-algorithms-your-ultimate-guide/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/03/03/otp-algorithms-your-ultimate-guide/]]></link>
			<title>OTP Algorithms: Your Ultimate Guide</title>
			<pubDate><![CDATA[Tue, 23 May 2023 21:44:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/02/14/all-you-need-to-know-about-hash-functions-in-otp-generation/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/02/14/all-you-need-to-know-about-hash-functions-in-otp-generation/]]></link>
			<title>All You Need to Know About Hash Functions  in OTP</title>
			<pubDate><![CDATA[Tue, 23 May 2023 21:44:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/02/19/from-hashing-to-authentication-the-storage-of-passwords/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/02/19/from-hashing-to-authentication-the-storage-of-passwords/]]></link>
			<title>From Hashing to Authentication: The Storage of Passwords</title>
			<pubDate><![CDATA[Tue, 21 Mar 2023 18:53:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/03/16/industrialized-phishing-mfa-security-at-risk/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/03/16/industrialized-phishing-mfa-security-at-risk/]]></link>
			<title>Industrialized Phishing: MFA Security at Risk</title>
			<pubDate><![CDATA[Tue, 21 Mar 2023 18:45:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/03/20/new-computer-terms-in-cybersecurity-part1/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/03/20/new-computer-terms-in-cybersecurity-part1/]]></link>
			<title>Popular Terms in Cybersecurity. Part1</title>
			<pubDate><![CDATA[Tue, 21 Mar 2023 18:27:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/03/17/stay-safe-online-how-to-avoid-phishing/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/03/17/stay-safe-online-how-to-avoid-phishing/]]></link>
			<title>Stay Safe Online: How to Avoid Phishing?</title>
			<pubDate><![CDATA[Tue, 18 Apr 2023 18:28:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/04/10/the-top-15-malware-of-all-time/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/04/10/the-top-15-malware-of-all-time/]]></link>
			<title>The Top 15 Malware of All Time</title>
			<pubDate><![CDATA[Tue, 18 Apr 2023 16:53:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/post-template/template-with-sidebar/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/post-template/template-with-sidebar/]]></link>
			<title>Template with Sidebar</title>
			<pubDate><![CDATA[Tue, 07 Mar 2023 19:31:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/web-stories/the-top-15-malware-of-all-time/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/web-stories/the-top-15-malware-of-all-time/]]></link>
			<title>The Top 15 Malware of All Time</title>
			<pubDate><![CDATA[Tue, 06 Feb 2024 19:27:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/10/01/are-totp-tokens-reliable-for-use-as-electronic-visit-verification-fob/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/10/01/are-totp-tokens-reliable-for-use-as-electronic-visit-verification-fob/]]></link>
			<title>Are TOTP Tokens Reliable for Use as Electronic Visit Verification FOB?</title>
			<pubDate><![CDATA[Tue, 03 Oct 2023 15:16:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/03/24/promising-horizons-of-biometric-authentication/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/03/24/promising-horizons-of-biometric-authentication/]]></link>
			<title>Promising Horizons of Biometric Authentication</title>
			<pubDate><![CDATA[Thu, 30 Mar 2023 12:38:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2025/06/19/16-billion-passwords-leaked-urgent-cybersecurity-warning/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2025/06/19/16-billion-passwords-leaked-urgent-cybersecurity-warning/]]></link>
			<title>16 Billion Passwords Leaked – Urgent Cybersecurity Warning</title>
			<pubDate><![CDATA[Thu, 19 Jun 2025 18:40:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2024/12/12/staggering-microsoft-mfa-loophole-high-stakes-revelations-radius-integration-and-a-leap-to-passwordless-security/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2024/12/12/staggering-microsoft-mfa-loophole-high-stakes-revelations-radius-integration-and-a-leap-to-passwordless-security/]]></link>
			<title>Staggering Microsoft MFA Loophole: High-Stakes Revelations, RADIUS Integration, and a Leap to Passwordless Security</title>
			<pubDate><![CDATA[Thu, 12 Dec 2024 20:38:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/03/18/https-protocol-your-online-security/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/03/18/https-protocol-your-online-security/]]></link>
			<title>HTTPS Protocol: Your Online Security</title>
			<pubDate><![CDATA[Sun, 19 Mar 2023 21:11:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/02/16/abcs-of-security-iidentification-authentication-and-authorization/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/02/16/abcs-of-security-iidentification-authentication-and-authorization/]]></link>
			<title>ABCs of Security: Identification, Authentication, and Authorization</title>
			<pubDate><![CDATA[Sun, 16 Apr 2023 13:41:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/penci-block/mega-menu2/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/penci-block/mega-menu2/]]></link>
			<title>Mega Menu2</title>
			<pubDate><![CDATA[Sun, 09 Apr 2023 22:40:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/become-a-sponsor/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/become-a-sponsor/]]></link>
			<title>Become a sponsor</title>
			<pubDate><![CDATA[Sun, 09 Apr 2023 21:04:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/04/01/how-to-navigate-the-cyber-threat-tree/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/04/01/how-to-navigate-the-cyber-threat-tree/]]></link>
			<title>How to Navigate the Cyber Threat Tree?</title>
			<pubDate><![CDATA[Sun, 09 Apr 2023 16:31:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2024/02/28/web-cookies-technology-for-beginners/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2024/02/28/web-cookies-technology-for-beginners/]]></link>
			<title>Web Cookies Technology For Beginners</title>
			<pubDate><![CDATA[Sun, 07 Apr 2024 10:07:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/08/05/totp-tokens-out-of-sync-how-to-solve-the-issue/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/08/05/totp-tokens-out-of-sync-how-to-solve-the-issue/]]></link>
			<title>TOTP Tokens Out of Sync: How to Solve the Issue?</title>
			<pubDate><![CDATA[Sun, 06 Aug 2023 15:56:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2024/05/04/all-you-need-to-know-about-passwords-best-practices/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2024/05/04/all-you-need-to-know-about-passwords-best-practices/]]></link>
			<title>All You Need To Know About Passwords: Best Practices</title>
			<pubDate><![CDATA[Sun, 05 May 2024 12:54:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/03/16/vpn-military-technology-changed-internet-security/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/03/16/vpn-military-technology-changed-internet-security/]]></link>
			<title>VPN: Military Technology Changed Internet Security</title>
			<pubDate><![CDATA[Sun, 02 Apr 2023 11:44:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/03/30/tired-of-spam-so-is-the-rest-of-the-world/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/03/30/tired-of-spam-so-is-the-rest-of-the-world/]]></link>
			<title>Tired of Spam? So Is the Rest of the World</title>
			<pubDate><![CDATA[Sun, 02 Apr 2023 11:31:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/02/15/power-of-authentication-mfa-2fa-and-strong-authentication/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/02/15/power-of-authentication-mfa-2fa-and-strong-authentication/]]></link>
			<title>Power of Authentication: MFA, 2FA and Strong Authentication</title>
			<pubDate><![CDATA[Sat, 24 Jun 2023 21:59:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/04/08/we-are-under-ddos-but-we-wont-pay/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/04/08/we-are-under-ddos-but-we-wont-pay/]]></link>
			<title>We are Under DDoS, but We Won&#8217;t Pay</title>
			<pubDate><![CDATA[Sat, 24 Jun 2023 21:47:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/05/24/how-to-secure-your-financial-data-in-online-shopping/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/05/24/how-to-secure-your-financial-data-in-online-shopping/]]></link>
			<title>How to Secure Your Financial Data in Online Shopping</title>
			<pubDate><![CDATA[Sat, 24 Jun 2023 21:34:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/06/24/the-social-engineering-in-action/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/06/24/the-social-engineering-in-action/]]></link>
			<title>The Social Engineering in action</title>
			<pubDate><![CDATA[Sat, 24 Jun 2023 21:18:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/contact/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/contact/]]></link>
			<title>Contact</title>
			<pubDate><![CDATA[Sat, 18 Feb 2023 23:00:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/archive-template/archive-template/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/archive-template/archive-template/]]></link>
			<title>Archive Template</title>
			<pubDate><![CDATA[Sat, 11 Jun 2022 17:39:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/04/01/killer-injections-securing-your-web-app-from-sql-injections/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/04/01/killer-injections-securing-your-web-app-from-sql-injections/]]></link>
			<title>Killer Injections: Securing Your Web App from SQL Injections</title>
			<pubDate><![CDATA[Mon, 10 Apr 2023 12:24:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/penci-block/mega-menu/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/penci-block/mega-menu/]]></link>
			<title>Mega Menu</title>
			<pubDate><![CDATA[Fri, 17 Feb 2023 21:03:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2025/09/12/mfa-fatigue-in-2025-practical-defenses-that-work/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2025/09/12/mfa-fatigue-in-2025-practical-defenses-that-work/]]></link>
			<title>MFA Fatigue in 2025: Practical Defenses That Work</title>
			<pubDate><![CDATA[Fri, 12 Sep 2025 15:52:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/home-2/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/home-2/]]></link>
			<title>Home 2</title>
			<pubDate><![CDATA[Fri, 10 Feb 2023 20:38:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/home-3/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/home-3/]]></link>
			<title>Home 3</title>
			<pubDate><![CDATA[Fri, 10 Feb 2023 20:38:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/post-template/template-1/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/post-template/template-1/]]></link>
			<title>Template 1</title>
			<pubDate><![CDATA[Fri, 10 Feb 2023 20:38:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/03/19/brute-force-attacks-and-how-to-prevent-them/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/03/19/brute-force-attacks-and-how-to-prevent-them/]]></link>
			<title>Brute Force Attacks and How to Prevent Them</title>
			<pubDate><![CDATA[Fri, 07 Apr 2023 22:02:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://aboutinfosec.com/2023/02/19/password-history-and-practical-tips-for-secure-use/]]></guid>
			<link><![CDATA[https://aboutinfosec.com/2023/02/19/password-history-and-practical-tips-for-secure-use/]]></link>
			<title>Password History and Practical Tips for Secure Use</title>
			<pubDate><![CDATA[Fri, 07 Apr 2023 22:01:36 +0000]]></pubDate>
		</item>
				</channel>
</rss>
