<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://thornton.technology/2019/03/04/exploit-discovered-in-5g-network/</loc><image:image><image:loc>https://thornton.technology/wp-content/uploads/2019/03/c9e85634-3a2b-4f11-8a11-1cc68ba7a28f.jpeg</image:loc><image:title>C9E85634-3A2B-4F11-8A11-1CC68BA7A28F</image:title></image:image><image:image><image:loc>https://thornton.technology/wp-content/uploads/2019/03/1ca7b3e7-95a7-42b1-9179-84ee530674d0.png</image:loc><image:title>1CA7B3E7-95A7-42B1-9179-84EE530674D0</image:title></image:image><lastmod>2019-03-04T21:20:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thornton.technology/2017/07/07/notpetay-or-petay/</loc><image:image><image:loc>https://thornton.technology/wp-content/uploads/2017/07/petay-ransom.png</image:loc><image:title>Petay.Ransom</image:title></image:image><lastmod>2019-03-04T20:51:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thornton.technology/2017/10/26/wi-fi-vulnerability-discovered/</loc><image:image><image:loc>https://thornton.technology/wp-content/uploads/2017/10/krack-attack-670x335.jpg</image:loc><image:title>krack-attack-670x335</image:title></image:image><image:image><image:loc>https://thornton.technology/wp-content/uploads/2017/10/krack.jpg</image:loc><image:title>Krack</image:title></image:image><lastmod>2017-10-28T00:45:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thornton.technology/2017/04/13/ubuntu-drops-unity/</loc><image:image><image:loc>https://thornton.technology/wp-content/uploads/2017/04/ubuntu.png</image:loc><image:title>ubuntu</image:title></image:image><image:image><image:loc>https://thornton.technology/wp-content/uploads/2017/04/gnome.png</image:loc><image:title>gnome</image:title></image:image><lastmod>2017-10-26T21:15:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thornton.technology/2017/05/13/windows-10-creators-update/</loc><image:image><image:loc>https://thornton.technology/wp-content/uploads/2017/05/windows-10-creators-update-problems.jpg</image:loc><image:title>windows-10-creators-update-problems</image:title></image:image><image:image><image:loc>https://thornton.technology/wp-content/uploads/2017/05/windows-update-4.png</image:loc><image:title>Windows-Update-4</image:title></image:image><image:image><image:loc>https://thornton.technology/wp-content/uploads/2017/05/creatorsupdate-start-menu.png</image:loc><image:title>creatorsupdate.start.menu</image:title></image:image><lastmod>2017-07-07T23:00:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thornton.technology/2017/05/28/chipolte-infected-with-credit-card-stealing-malware/</loc><image:image><image:loc>https://thornton.technology/wp-content/uploads/2017/05/chipolte.jpg</image:loc><image:title>Chipolte</image:title></image:image><lastmod>2017-05-28T20:24:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thornton.technology/2017/04/16/attackers-exploit-microsoft-office-zero-day/</loc><image:image><image:loc>https://thornton.technology/wp-content/uploads/2017/04/word-zero-day-exploit.jpg</image:loc><image:title>word.zero.day.exploit</image:title></image:image><lastmod>2017-05-28T15:57:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thornton.technology/2016/11/14/is-your-computer-infected/</loc><image:image><image:loc>https://thornton.technology/wp-content/uploads/2016/11/infection.jpg</image:loc><image:title>infection</image:title></image:image><image:image><image:loc>https://thornton.technology/wp-content/uploads/2016/11/prevent_malware.jpg</image:loc><image:title>prevent_malware</image:title></image:image><image:image><image:loc>https://thornton.technology/wp-content/uploads/2016/11/total-malware-evolution.png</image:loc><image:title>total-malware-evolution</image:title></image:image><lastmod>2017-04-17T03:00:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thornton.technology/2016/12/28/quantum-cryptography/</loc><image:image><image:loc>https://thornton.technology/wp-content/uploads/2016/12/quantum_cryptography1.jpg</image:loc><image:title>quantum_cryptography</image:title></image:image><image:image><image:loc>https://thornton.technology/wp-content/uploads/2016/12/quantum-cryptography-braintree.jpg</image:loc><image:title>quantum-cryptography-braintree</image:title></image:image><lastmod>2017-04-13T04:35:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thornton.technology/2016/11/30/android-malware-exposes-1-million-google-accounts-are-you-affected/</loc><image:image><image:loc>https://thornton.technology/wp-content/uploads/2016/11/android-malware.png</image:loc><image:title>android-malware</image:title></image:image><image:image><image:loc>https://thornton.technology/wp-content/uploads/2016/11/gooligan.jpg</image:loc><image:title>gooligan</image:title></image:image><lastmod>2017-04-13T04:14:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thornton.technology/2016/12/15/worlds-largest-hack-affects-1-billion-yahoo-users/</loc><image:image><image:loc>https://thornton.technology/wp-content/uploads/2016/12/yahoo_1_billion.jpg</image:loc><image:title>yahoo_1_billion</image:title></image:image><lastmod>2017-04-13T04:06:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thornton.technology/2017/03/14/preinstalled-malware-found-on-36-types-of-android-phones/</loc><image:image><image:loc>https://thornton.technology/wp-content/uploads/2017/03/malware-android.jpg</image:loc><image:title>malware-android</image:title></image:image><lastmod>2017-04-13T04:05:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thornton.technology/2016/11/12/introducing-microsofts-project-scorpio/</loc><image:image><image:loc>https://thornton.technology/wp-content/uploads/2016/11/project-scorpio-4k.jpg</image:loc><image:title>project-scorpio-4k</image:title></image:image><lastmod>2016-12-28T04:39:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thornton.technology/2016/11/20/facebooks-plan-to-combat-fake-news/</loc><image:image><image:loc>https://thornton.technology/wp-content/uploads/2016/11/fake-news-stories-satire-660x400.jpg</image:loc><image:title>Edwards Affair</image:title><image:caption>National Enquirer magazines are shown on a magazine stand in the Hollywood section of Los Angeles Friday, Aug. 8, 2008. Former U.S. presidential candidate John Edwards admitted in shame Friday he had had an extramarital affair with a woman who produced videos for his campaign. (AP Photo/Nick Ut)</image:caption></image:image><image:image><image:loc>https://thornton.technology/wp-content/uploads/2016/11/fakenews.jpg</image:loc><image:title>fakenews</image:title></image:image><image:image><image:loc>https://thornton.technology/wp-content/uploads/2016/11/badnews.jpg</image:loc><image:title>badnews</image:title></image:image><lastmod>2016-12-28T04:31:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thornton.technology/2016/11/24/poison-tap-is-5-and-hacks-locked-computers/</loc><image:image><image:loc>https://thornton.technology/wp-content/uploads/2016/11/poison_tap_plug.jpg</image:loc><image:title>poison_tap_plug</image:title></image:image><image:image><image:loc>https://thornton.technology/wp-content/uploads/2016/11/posion_tap.jpg</image:loc><image:title>posion_tap</image:title></image:image><lastmod>2016-12-28T04:31:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thornton.technology/2016/11/04/microsoft-continues-to-innovate-with-surface-studio/</loc><image:image><image:loc>https://thornton.technology/wp-content/uploads/2016/11/studio.jpg</image:loc><image:title>studio</image:title></image:image><image:image><image:loc>https://thornton.technology/wp-content/uploads/2016/11/studio1.jpg</image:loc><image:title>studio1</image:title></image:image><lastmod>2016-12-01T00:59:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thornton.technology/2016/11/02/russian-hackers-using-windows-bug-that-google-exposed/</loc><image:image><image:loc>https://thornton.technology/wp-content/uploads/2016/11/email-security-checklist.png</image:loc><image:title>email-security-checklist</image:title></image:image><lastmod>2016-12-01T00:58:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thornton.technology/2016/10/31/major-windows-bug-discovered-by-google/</loc><image:image><image:loc>https://thornton.technology/wp-content/uploads/2016/10/bug.png</image:loc><image:title>bug</image:title></image:image><image:image><image:loc>https://thornton.technology/wp-content/uploads/2016/10/bug.jpg</image:loc><image:title>bug</image:title></image:image><lastmod>2016-12-01T00:57:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thornton.technology/2016/11/07/apple-macbook-pro-2016/</loc><image:image><image:loc>https://thornton.technology/wp-content/uploads/2016/11/macbook-pro-2016-oled-touchbar.png</image:loc><image:title>macbook-pro-2016-oled-touchbar</image:title></image:image><lastmod>2016-11-07T17:47:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thornton.technology/about/</loc><lastmod>2016-10-29T18:01:50+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thornton.technology/contact/</loc><lastmod>2016-10-29T06:24:28+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thornton.technology</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2019-03-04T21:20:42+00:00</lastmod></url></urlset>
