<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:xhtml="http://www.w3.org/1999/xhtml"
        xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/v/the-internet-cybersecurity-and-crime</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/code-org/computers-and-the-internet/internet-works/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="cs"
                    href="https://cs.khanacademy.org/computing/code-org/computers-and-the-internet/internet-works/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="mr"
                    href="https://mr.khanacademy.org/science/mh-grade-10-science/xf0d64b81b0b74ee4:social-health/xf0d64b81b0b74ee4:cyber-security/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/code-org/computers-and-the-internet/internet-works/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="ro"
                    href="https://ro.khanacademy.org/computing/siguranta-pe-internet/x2a306cf2144cb3b3:siguranta-datelor-online/x2a306cf2144cb3b3:cyber-attacks/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="tr"
                    href="https://tr.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/college-careers-more/an-toan-internet/x8182d33f1114b84c:an-toan-internet/x8182d33f1114b84c:tim-hieu-nhan-biet-va-phong-tranh-lua-dao-tren-khong-gian-mang/v/the-internet-cybersecurity-and-crime" />
        
        <lastmod>2021-03-22T14:52:39Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="the-internet-cybersecurity-and-crime">
            <Attribute name="title">Cybersecurity and crime</Attribute>
            <Attribute name="description">Google Security Princess Parisa Tabriz and Jenny Martin from Symantec introduce the most common types of cybercrime, including viruses, malware, DDOS attacks and phishing scams. </Attribute>
            
            <Attribute name="type">video</Attribute>
            
            </DataObject>
        </PageMap>
        
        <video:video>
            <video:thumbnail_loc>https://cdn.kastatic.org/googleusercontent/ZCdwTudJg6e6n-P2gsaUborP4izvMsGo71pvEVlX9dNYWcLXcP7VHkWpn2grt4TUP1KoJLQP9NswyHBuBLSFTBw</video:thumbnail_loc>
            <video:title>Cybersecurity and crime</video:title>
            <video:description>Google Security Princess Parisa Tabriz and Jenny Martin from Symantec introduce the most common types of cybercrime, including viruses, malware, DDOS attacks and phishing scams. </video:description>
            <video:player_loc>https://cdn.kastatic.org/ka-youtube-converted/5k24We8pED8.mp4/5k24We8pED8.mp4</video:player_loc>
            <video:duration>302</video:duration>
            <video:category>Cybersecurity</video:category>
        </video:video>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/phishing-attacks</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/a/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="de"
                    href="https://de.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/a/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/a/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="mr"
                    href="https://mr.khanacademy.org/science/mh-grade-10-science/xf0d64b81b0b74ee4:social-health/xf0d64b81b0b74ee4:cyber-security/a/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/a/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/a/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="ro"
                    href="https://ro.khanacademy.org/computing/siguranta-pe-internet/x2a306cf2144cb3b3:siguranta-datelor-online/x2a306cf2144cb3b3:cyber-attacks/a/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/computing/may-tinh-va-internet/x048967ab7b3223c2:bao-mat-du-lieu-mang-may-tinh-va-internet/x048967ab7b3223c2:tan-cong-mang-may-tinh-va-internet/a/phishing-attacks" />
        
        <lastmod>2024-06-03T03:33:24.453729583Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="phishing-attacks">
            <Attribute name="title">Phishing attacks</Attribute>
            
            
            <Attribute name="type">article</Attribute>
            
            </DataObject>
        </PageMap>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/v/how-not-to-get-hacked-phishing</loc>
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/v/how-not-to-get-hacked-phishing" />
        
        <lastmod>2024-01-19T15:52:04.591125233Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="how-not-to-get-hacked-phishing">
            <Attribute name="title">How Not To Get Hacked: Phishing</Attribute>
            <Attribute name="description">Phishing is a common cyber attack in which attackers use fake emails, text messages, or other forms of communication to trick individuals into divulging sensitive information. In this video, we&#39;ll discuss how to recognize phishing attacks and offer tips for avoiding them.&#xA;</Attribute>
            <Attribute name="author">Code.org</Attribute>
            <Attribute name="type">video</Attribute>
            
            </DataObject>
        </PageMap>
        
        <video:video>
            <video:thumbnail_loc>https://cdn.kastatic.org/googleusercontent/ZCdwTudJg6e6n-P2gsaUborP4izvMsGo71pvEVlX9dNYWcLXcP7VHkWpn2grt4TUP1KoJLQP9NswyHBuBLSFTBw</video:thumbnail_loc>
            <video:title>How Not To Get Hacked: Phishing</video:title>
            <video:description>Phishing is a common cyber attack in which attackers use fake emails, text messages, or other forms of communication to trick individuals into divulging sensitive information. In this video, we&#39;ll discuss how to recognize phishing attacks and offer tips for avoiding them.&#xA;</video:description>
            <video:player_loc>https://cdn.kastatic.org/ka-youtube-converted/YfiM8rXg3ug.mp4/YfiM8rXg3ug.mp4</video:player_loc>
            <video:duration>112</video:duration>
            <video:category>Cybersecurity</video:category>
        </video:video>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/phishing-attacks</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/e/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="de"
                    href="https://de.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/e/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/e/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="mr"
                    href="https://mr.khanacademy.org/science/maharashtra-board-preparation-class-10in/xba381aded23053de:week-3/xba381aded23053de:social-health-disaster-management-and-space-missions/e/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/e/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/e/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/computing/may-tinh-va-internet/x048967ab7b3223c2:bao-mat-du-lieu-mang-may-tinh-va-internet/x048967ab7b3223c2:tan-cong-mang-may-tinh-va-internet/e/phishing-attacks" />
        
        <lastmod>2024-07-15T03:55:09.600941203Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="phishing-attacks">
            <Attribute name="title">Phishing attacks</Attribute>
            <Attribute name="description">Check your understanding of phishing attacks in this set of free practice questions designed for AP Computer Science Principles students.</Attribute>
            <Attribute name="author">Pamela</Attribute>
            <Attribute name="type">exercise</Attribute>
            
            </DataObject>
        </PageMap>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/rogue-access-points-mitm-attacks</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/rogue-access-points-mitm-attacks" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/a/rogue-access-points-mitm-attacks" />
        
        <xhtml:link rel="alternate" hreflang="de"
                    href="https://de.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/rogue-access-points-mitm-attacks" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/rogue-access-points-mitm-attacks" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/a/rogue-access-points-mitm-attacks" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/a/rogue-access-points-mitm-attacks" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/rogue-access-points-mitm-attacks" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/a/rogue-access-points-mitm-attacks" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/a/rogue-access-points-mitm-attacks" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/computing/may-tinh-va-internet/x048967ab7b3223c2:bao-mat-du-lieu-mang-may-tinh-va-internet/x048967ab7b3223c2:tan-cong-mang-may-tinh-va-internet/a/rogue-access-points-mitm-attacks" />
        
        <xhtml:link rel="alternate" hreflang="zh-hans"
                    href="https://zh.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/rogue-access-points-mitm-attacks" />
        
        <lastmod>2021-04-29T07:57:14Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="rogue-access-points-mitm-attacks">
            <Attribute name="title">Rogue access points</Attribute>
            
            
            <Attribute name="type">article</Attribute>
            
            </DataObject>
        </PageMap>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/rogue-access-points</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/rogue-access-points" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/e/rogue-access-points" />
        
        <xhtml:link rel="alternate" hreflang="de"
                    href="https://de.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/rogue-access-points" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/rogue-access-points" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/e/rogue-access-points" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/e/rogue-access-points" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/rogue-access-points" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/e/rogue-access-points" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/e/rogue-access-points" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/computing/may-tinh-va-internet/x048967ab7b3223c2:bao-mat-du-lieu-mang-may-tinh-va-internet/x048967ab7b3223c2:tan-cong-mang-may-tinh-va-internet/e/rogue-access-points" />
        
        <lastmod>2023-05-01T01:52:26.971064259Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="rogue-access-points">
            <Attribute name="title">Rogue access points</Attribute>
            <Attribute name="description">Check your understanding of how rogue access points can intercept data in this set of free practice questions designed for AP Computer Science Principles students.</Attribute>
            <Attribute name="author">Pamela</Attribute>
            <Attribute name="type">exercise</Attribute>
            
            </DataObject>
        </PageMap>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/computer-malware</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/a/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="de"
                    href="https://de.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/a/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/a/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/a/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/a/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="ro"
                    href="https://ro.khanacademy.org/computing/siguranta-pe-internet/x2a306cf2144cb3b3:siguranta-datelor-online/x2a306cf2144cb3b3:cyber-attacks/a/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/computing/may-tinh-va-internet/x048967ab7b3223c2:bao-mat-du-lieu-mang-may-tinh-va-internet/x048967ab7b3223c2:tan-cong-mang-may-tinh-va-internet/a/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="zh-hans"
                    href="https://zh.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/computer-malware" />
        
        <lastmod>2021-04-29T07:48:34Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="computer-malware">
            <Attribute name="title">Computer malware</Attribute>
            
            
            <Attribute name="type">article</Attribute>
            
            </DataObject>
        </PageMap>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/v/how-not-to-get-hacked-messaging-and-downloads</loc>
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/v/how-not-to-get-hacked-messaging-and-downloads" />
        
        <lastmod>2024-01-19T15:52:04.591125233Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="how-not-to-get-hacked-messaging-and-downloads">
            <Attribute name="title">How Not To Get Hacked: Messaging and Downloads</Attribute>
            <Attribute name="description">Messaging and downloads are two areas where cyber threats can lurk, but with the right knowledge, you can protect yourself from being hacked. In this video, we&#39;ll cover some best practices for messaging and download security to help keep you and your personal information safe.</Attribute>
            <Attribute name="author">Code.org</Attribute>
            <Attribute name="type">video</Attribute>
            
            </DataObject>
        </PageMap>
        
        <video:video>
            <video:thumbnail_loc>https://cdn.kastatic.org/googleusercontent/ZCdwTudJg6e6n-P2gsaUborP4izvMsGo71pvEVlX9dNYWcLXcP7VHkWpn2grt4TUP1KoJLQP9NswyHBuBLSFTBw</video:thumbnail_loc>
            <video:title>How Not To Get Hacked: Messaging and Downloads</video:title>
            <video:description>Messaging and downloads are two areas where cyber threats can lurk, but with the right knowledge, you can protect yourself from being hacked. In this video, we&#39;ll cover some best practices for messaging and download security to help keep you and your personal information safe.</video:description>
            <video:player_loc>https://cdn.kastatic.org/ka-youtube-converted/IxjWR_uexOc.mp4/IxjWR_uexOc.mp4</video:player_loc>
            <video:duration>77</video:duration>
            <video:category>Cybersecurity</video:category>
        </video:video>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/v/how-not-to-get-hacked-install-updates</loc>
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/v/how-not-to-get-hacked-install-updates" />
        
        <lastmod>2024-01-19T15:52:04.591125233Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="how-not-to-get-hacked-install-updates">
            <Attribute name="title">How Not To Get Hacked: Install Updates</Attribute>
            <Attribute name="description">Installing updates is a crucial step in keeping your devices and personal information safe from cyberattacks. In this final video of our How Not to Get Hacked series, we&#39;ll discuss why installing updates is so important, and offer a hopeful outlook for the future of cybersecurity.</Attribute>
            <Attribute name="author">Code.org</Attribute>
            <Attribute name="type">video</Attribute>
            
            </DataObject>
        </PageMap>
        
        <video:video>
            <video:thumbnail_loc>https://cdn.kastatic.org/googleusercontent/ZCdwTudJg6e6n-P2gsaUborP4izvMsGo71pvEVlX9dNYWcLXcP7VHkWpn2grt4TUP1KoJLQP9NswyHBuBLSFTBw</video:thumbnail_loc>
            <video:title>How Not To Get Hacked: Install Updates</video:title>
            <video:description>Installing updates is a crucial step in keeping your devices and personal information safe from cyberattacks. In this final video of our How Not to Get Hacked series, we&#39;ll discuss why installing updates is so important, and offer a hopeful outlook for the future of cybersecurity.</video:description>
            <video:player_loc>https://cdn.kastatic.org/ka-youtube-converted/goMnkhKBOHY.mp4/goMnkhKBOHY.mp4</video:player_loc>
            <video:duration>86</video:duration>
            <video:category>Cybersecurity</video:category>
        </video:video>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/computer-malware</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/e/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="de"
                    href="https://de.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/e/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/e/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/e/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/e/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/computing/may-tinh-va-internet/x048967ab7b3223c2:bao-mat-du-lieu-mang-may-tinh-va-internet/x048967ab7b3223c2:tan-cong-mang-may-tinh-va-internet/e/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="zh-hans"
                    href="https://zh.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/computer-malware" />
        
        <lastmod>2021-04-29T07:52:15Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="computer-malware">
            <Attribute name="title">Computer malware</Attribute>
            <Attribute name="description">Check your understanding of computer malware, computer viruses, and keylogging in this set of free practice questions designed for AP Computer Science Principles students.</Attribute>
            <Attribute name="author">Pamela</Attribute>
            <Attribute name="type">exercise</Attribute>
            
            </DataObject>
        </PageMap>
        
    </url>
    
</urlset>
