<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 9:40 pm by All in One SEO v4.6.0 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://philswain.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>PhilSwain - IT Blog for All Skill Levels</title>
		<link><![CDATA[https://philswain.com]]></link>
		<description><![CDATA[PhilSwain - IT Blog for All Skill Levels]]></description>
		<lastBuildDate><![CDATA[Wed, 26 Apr 2023 20:25:20 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://philswain.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://philswain.com/the-history-and-evolution-of-trojan-malware]]></guid>
			<link><![CDATA[https://philswain.com/the-history-and-evolution-of-trojan-malware]]></link>
			<title>The History and Evolution of Trojan Malware</title>
			<pubDate><![CDATA[Wed, 26 Apr 2023 20:25:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/]]></guid>
			<link><![CDATA[https://philswain.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 22:34:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/ransomware-what-it-is-how-it-works-and-why-you-should-care]]></guid>
			<link><![CDATA[https://philswain.com/ransomware-what-it-is-how-it-works-and-why-you-should-care]]></link>
			<title>Ransomware: What it is, how it works, and why you should care</title>
			<pubDate><![CDATA[Wed, 26 Apr 2023 20:19:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/computer-worm-infections-what-are-they-and-essential-strategies-for-safeguarding-your-digital-assets]]></guid>
			<link><![CDATA[https://philswain.com/computer-worm-infections-what-are-they-and-essential-strategies-for-safeguarding-your-digital-assets]]></link>
			<title>Computer Worm Infections: What Are They and Essential Strategies for Safeguarding Your Digital Assets</title>
			<pubDate><![CDATA[Wed, 03 May 2023 20:06:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/the-science-behind-why-social-engineering-techniques-work]]></guid>
			<link><![CDATA[https://philswain.com/the-science-behind-why-social-engineering-techniques-work]]></link>
			<title>The Science Behind Why Social Engineering Techniques Work</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 22:26:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/the-rise-of-cyber-influence-campaigns]]></guid>
			<link><![CDATA[https://philswain.com/the-rise-of-cyber-influence-campaigns]]></link>
			<title>The Rise of Cyber Influence Campaigns</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 22:23:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/typosquatting-the-silent-threat-to-your-online-security]]></guid>
			<link><![CDATA[https://philswain.com/typosquatting-the-silent-threat-to-your-online-security]]></link>
			<title>Typosquatting: The Silent Threat to Your Online Security</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 22:23:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/the-different-techniques-cybercriminals-use-for-watering-hole-attacks]]></guid>
			<link><![CDATA[https://philswain.com/the-different-techniques-cybercriminals-use-for-watering-hole-attacks]]></link>
			<title>The Different Techniques Cybercriminals Use for Watering Hole Attacks</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 22:19:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/how-hackers-use-reconnaissance-to-gain-access-to-your-systems-and-data]]></guid>
			<link><![CDATA[https://philswain.com/how-hackers-use-reconnaissance-to-gain-access-to-your-systems-and-data]]></link>
			<title>How Hackers Use Reconnaissance to Gain Access to Your Systems and Data</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 22:17:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/preventing-credential-harvesting-best-practices-for-password-protection]]></guid>
			<link><![CDATA[https://philswain.com/preventing-credential-harvesting-best-practices-for-password-protection]]></link>
			<title>Preventing Credential Harvesting: Best Practices for Password Protection</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 22:15:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/invoice-scams-how-they-work-and-how-to-avoid-them]]></guid>
			<link><![CDATA[https://philswain.com/invoice-scams-how-they-work-and-how-to-avoid-them]]></link>
			<title>Invoice Scams: How They Work and How to Avoid Them</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 22:14:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/templates/about]]></guid>
			<link><![CDATA[https://philswain.com/templates/about]]></link>
			<title>About Us</title>
			<pubDate><![CDATA[Wed, 19 Apr 2023 21:19:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/identity-fraud-and-cybersecurity-why-its-critical-to-stay-protected-online]]></guid>
			<link><![CDATA[https://philswain.com/identity-fraud-and-cybersecurity-why-its-critical-to-stay-protected-online]]></link>
			<title>Identity Fraud and Cybersecurity: Why It&#8217;s Critical to Stay Protected Online</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 22:13:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/prepending-vs-pretexting-whats-the-difference-and-why-does-it-matter]]></guid>
			<link><![CDATA[https://philswain.com/prepending-vs-pretexting-whats-the-difference-and-why-does-it-matter]]></link>
			<title>Prepending vs. Pretexting: What&#8217;s the Difference and Why Does it Matter?</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 22:11:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/whaling-attacks-how-cybercriminals-target-high-profile-executives-and-what-you-can-do-to-protect-yourself]]></guid>
			<link><![CDATA[https://philswain.com/whaling-attacks-how-cybercriminals-target-high-profile-executives-and-what-you-can-do-to-protect-yourself]]></link>
			<title>Whaling Attacks: How Cybercriminals Target High-Profile Executives and What You Can Do to Protect Yourself</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 22:09:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/templates/contact]]></guid>
			<link><![CDATA[https://philswain.com/templates/contact]]></link>
			<title>Contact Us</title>
			<pubDate><![CDATA[Wed, 19 Apr 2023 21:29:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/what-is-tailgating]]></guid>
			<link><![CDATA[https://philswain.com/what-is-tailgating]]></link>
			<title>What is Tailgating?</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 22:07:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/what-is-dumpster-diving]]></guid>
			<link><![CDATA[https://philswain.com/what-is-dumpster-diving]]></link>
			<title>What is Dumpster Diving?</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 22:01:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/what-is-a-spear-phishing-attack]]></guid>
			<link><![CDATA[https://philswain.com/what-is-a-spear-phishing-attack]]></link>
			<title>What is a Spear Phishing Attack?</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 22:00:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/spam-over-instant-messaging-spim]]></guid>
			<link><![CDATA[https://philswain.com/spam-over-instant-messaging-spim]]></link>
			<title>Spam Over Instant Messaging (SPIM)</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 21:58:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/what-exactly-is-email-spam]]></guid>
			<link><![CDATA[https://philswain.com/what-exactly-is-email-spam]]></link>
			<title>What Exactly is Email SPAM?</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 21:57:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/vishing-voice-phishing]]></guid>
			<link><![CDATA[https://philswain.com/vishing-voice-phishing]]></link>
			<title>Vishing (Voice Phishing)</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 21:55:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/email-phishing]]></guid>
			<link><![CDATA[https://philswain.com/email-phishing]]></link>
			<title>Email Phishing (Social Engineering)</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 21:54:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/smishing-social-engineering]]></guid>
			<link><![CDATA[https://philswain.com/smishing-social-engineering]]></link>
			<title>Smishing (Social Engineering)</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 21:53:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/cybersecurity-acronyms]]></guid>
			<link><![CDATA[https://philswain.com/cybersecurity-acronyms]]></link>
			<title>Cybersecurity Acronyms</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 21:47:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/templates/full-width]]></guid>
			<link><![CDATA[https://philswain.com/templates/full-width]]></link>
			<title>Full Width</title>
			<pubDate><![CDATA[Wed, 19 Apr 2023 20:47:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/landing]]></guid>
			<link><![CDATA[https://philswain.com/landing]]></link>
			<title>Newsource Demo Selector</title>
			<pubDate><![CDATA[Wed, 19 Apr 2023 20:47:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/the-dangers-of-pharming-attacks]]></guid>
			<link><![CDATA[https://philswain.com/the-dangers-of-pharming-attacks]]></link>
			<title>The Dangers of Pharming Attacks</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 22:04:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/sample-page]]></guid>
			<link><![CDATA[https://philswain.com/sample-page]]></link>
			<title>Sample Page</title>
			<pubDate><![CDATA[Tue, 18 Apr 2023 22:31:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/test]]></guid>
			<link><![CDATA[https://philswain.com/test]]></link>
			<title>test</title>
			<pubDate><![CDATA[Tue, 13 Oct 2020 12:48:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/what-is-shoulder-surfing]]></guid>
			<link><![CDATA[https://philswain.com/what-is-shoulder-surfing]]></link>
			<title>What is Shoulder Surfing?</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 22:03:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/sample-page-2]]></guid>
			<link><![CDATA[https://philswain.com/sample-page-2]]></link>
			<title>Sample Page</title>
			<pubDate><![CDATA[Fri, 11 Dec 2020 12:25:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/privacy-policy-2]]></guid>
			<link><![CDATA[https://philswain.com/privacy-policy-2]]></link>
			<title>Privacy Policy</title>
			<pubDate><![CDATA[Mon, 09 Dec 2019 14:34:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/templates]]></guid>
			<link><![CDATA[https://philswain.com/templates]]></link>
			<title>Templates</title>
			<pubDate><![CDATA[Fri, 28 Mar 2014 19:24:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://philswain.com/news]]></guid>
			<link><![CDATA[https://philswain.com/news]]></link>
			<title>News</title>
			<pubDate><![CDATA[Fri, 05 Apr 2019 12:30:34 +0000]]></pubDate>
		</item>
				</channel>
</rss>
