<?xml version="1.0" encoding="utf-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url><loc>https://www.kaspersky.com</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center</loc></url>
    <url><loc>https://www.kaspersky.com/downloads/thank-you/total-security-free-trial</loc></url>
    <url><loc>https://www.kaspersky.com/downloads/thank-you/mac-security-free-trial</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/advanced-persistent-threats</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/biometrics</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/tips-for-mobile-security-smartphone</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/azure-hybrid-cloud-security</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/ddos-attacks</loc></url>
    <url><loc>https://www.kaspersky.com/partners/technology/solutions</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/money-online</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/krack</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/targeted-virus-attacks</loc></url>
    <url><loc>https://www.kaspersky.com/partners/affiliate</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/contact</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/linux-mail-server</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/resources/data-sheets</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/protecting-your-data-online-password-manager</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/malware-system-vulnerability</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/cybersecurity-awareness/demo/</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/applications</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/malware-popularity</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/tunneling-protocol</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/windows-server-security</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/endpoint-advanced</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/data-breach</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/contact/thank-you</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/faq</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/what-to-do-if-your-identity-is-stolen-a-step-by-step-guide</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/secure-your-internet-device</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/small-business-security</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/storage-security</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/incident-response</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/endpoint-core</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/wiki-section/home</loc></url>
    <url><loc>https://www.kaspersky.com/about/fighting-crime</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/resources/case-studies/ferrari</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/cell-phone-spyware</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/viruses-malware</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/webcam-hacking</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/file-server-free-trial</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/replay-attack</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/infographics/smart-homes</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/data-mining</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/threat-management-defense-solution</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/crouching-yeti-energetic-bear-malware-threat</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/online-currency-theft</loc></url>
    <url><loc>https://www.kaspersky.com/about/solutions-and-services</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/internet-of-things-security-risks</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/onion-ransomware-virus-threat</loc></url>
    <url><loc>https://www.kaspersky.com/partners/technology</loc></url>
    <url><loc>https://www.kaspersky.com/battery-life-saver</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/ransomware-threats-an-in-depth-guide</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/avoiding-a-trojan-virus</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/pornware</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/systems-management</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/mobile</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/clickjacking</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/vishing</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/embedded-systems</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/scareware</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/malware-remover-vs-antivirus-software</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/privacy-and-security-on-the-internet</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/telecom</loc></url>
    <url><loc>https://www.kaspersky.com/small-business-security/contact-us</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/antispyware-provides-best-computer-defense</loc></url>
    <url><loc>https://www.kaspersky.com/about/awards</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/kids-preemptive-safety</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/why-is-my-internet-not-working</loc></url>
    <url><loc>https://www.kaspersky.com/small-business-security/downloads/small-office-security</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/total</loc></url>
    <url><loc>https://www.kaspersky.com/global-privacy-policy</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/virtualization-agentless</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/systems-management</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/products</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/shareware</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/types-of-malware</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/lost-stolen-phone</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/keylogger</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/how-to-recover-deleted-files</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/cloud</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/infographics/infographic-parental-control-internet-safety-for-kids</loc></url>
    <url><loc>https://www.kaspersky.com/top3</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/how-to-remove-a-virus-or-malware-from-your-pc</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/top-six-online-scams-how-to-avoid-becoming-a-victim</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/malicious-tools</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/infographics</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/virtualization-light-agent</loc></url>
    <url><loc>https://www.kaspersky.com/about/careers/professionals</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/solutions/ddos-protection</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/file-server</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/public-wifi</loc></url>
    <url><loc>https://www.kaspersky.com/renewal-center/vsb</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/endpoint-select</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/blue-termite</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/pharming</loc></url>
    <url><loc>https://www.kaspersky.com/vpn-connection</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/transportation-cybersecurity-it-infrastructure</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/how-to-monitor-freeze-your-credit</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/web</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/simple-tips-spam-mail-protection</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/endpoint-linux</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/social-engineering</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/cybersquatting</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/ransomware</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/cyber-threats-from-foreign-hackers</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/mobile-phone-virus-protection</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/endpoint</loc></url>
    <url><loc>https://www.kaspersky.com/about/security-without-borders</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/is-your-smart-tv-spying-on-you</loc></url>
    <url><loc>https://www.kaspersky.com/about/careers/our-fields-of-work</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/infographics/vulnerable-software</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/security-center</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/dangers-of-spam-texts</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/collaboration</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/car-hacks-and-how-to-protect-yourself</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/endpoint</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/microsoft-office-365-security</loc></url>
    <url><loc>https://www.kaspersky.com/about/kaspersky-motorsport</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/aws-hybrid-cloud-security</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/resources/white-papers</loc></url>
    <url><loc>https://www.kaspersky.com/downloads</loc></url>
    <url><loc>https://www.kaspersky.com/downloads/thank-you/safe-kids-pc</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/why-is-my-computer-so-slow</loc></url>
    <url><loc>https://www.kaspersky.com/downloads/thank-you/password-manager-pc</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/cloud-antivirus</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/android-device-security</loc></url>
    <url><loc>https://www.kaspersky.com/end-user-license-agreement</loc></url>
    <url><loc>https://www.kaspersky.com/about-trust</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/what-to-do-if-your-email-account-has-been-hacked</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/adware</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/what-is-phishings-impact-on-email</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/antivirus-choices</loc></url>
    <url><loc>https://www.kaspersky.com/small-business-security/downloads/thank-you/small-office-security-free-trial</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/wiki-section/products/emulator</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/thank-you</loc></url>
    <url><loc>https://www.kaspersky.com/small-business-security/small-office-security</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/resources/case-studies</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/wiki-section/products/kaspersky-anti-targeted-attack-platform</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/hardware-failure</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/koler-police-ransomware-virus</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/what-is-the-koobface-virus</loc></url>
    <url><loc>https://www.kaspersky.com/free-antivirus</loc></url>
    <url><loc>https://www.kaspersky.com/mac-security</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/why-facebook-parties-go-wrong</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/regin-platform-malware</loc></url>
    <url><loc>https://www.kaspersky.com/auto-renewal-service</loc></url>
    <url><loc>https://www.kaspersky.com/qr-scanner</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/internet-safety-for-kids-time-to-grow-up</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/encryption</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/what-is-voip</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/preemptive-safety-tips-for-parents</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/cloud-security-product</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/embedded-systems</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/total-free-trial</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/computer-vandalism</loc></url>
    <url><loc>https://www.kaspersky.com/small-business-security/downloads</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/metamorphic-virus</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/what-is-a-polymorphic-virus</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/apt-intelligence-reporting/sample</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/duqu-2</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/major-celebrity-hacks-and-how-they-can-affect-you</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/finance</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/warhol-worm</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/hacking-system-vulnerabilities</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/social-media-password-generator</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/website-security-is-your-business-at-risk</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/riskware</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/adware-pornware-riskware</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/how-to-run-a-virus-scan</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/ezula</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/spam-statistics-report-q1-2014</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/infographics/safe-money</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/spammer-support</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/identifying-and-avoiding-fake-apps</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/mail-server</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/computer-adware-protection</loc></url>
    <url><loc>https://www.kaspersky.com/about/press-releases</loc></url>
    <url><loc>https://www.kaspersky.com/anti-corruption-policy</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/hellsing-apt</loc></url>
    <url><loc>https://www.kaspersky.com/free-mac-virus-scan</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/how-to-buy</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/services</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/protecting-wireless-networks</loc></url>
    <url><loc>https://www.kaspersky.com/identity-theft-protection</loc></url>
    <url><loc>https://www.kaspersky.com/downloads/thank-you/antivirus-free-trial</loc></url>
    <url><loc>https://www.kaspersky.com/small-business-security</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/wiki-section/products/fileless-threats-protection</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/microsoft-exchange-server</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/phishing-prevention-tips</loc></url>
    <url><loc>https://www.kaspersky.com/antivirus</loc></url>
    <url><loc>https://www.kaspersky.com/about/careers/life-at-kaspersky</loc></url>
    <url><loc>https://www.kaspersky.com/about/our-unique-experience-and-knowledge</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/endpoint-advanced-free-trial</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/top-ten-most-notorious-infamous-hackers-of-all-time</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/web-filter</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/wiki-section/products/kaspersky-security-network</loc></url>
    <url><loc>https://www.kaspersky.com/about/transparency</loc></url>
    <url><loc>https://www.kaspersky.com/downloads/thank-you/safe-kids-mac</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/security-awareness</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/wild-neutron</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/a-brief-history-of-computer-viruses-and-what-the-future-holds</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/computer-viruses-and-malware-facts-and-faqs</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/wiki-section/products/ransomware-protection</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/tech-support-scams</loc></url>
    <url><loc>https://www.kaspersky.com/partners/technology/contact</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/spear-phishing</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/mobile</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/infographics/mac-flashback</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/mobile-device</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/solutions/cybersecurity-services</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/need-mac-antivirus</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/online-payment-account-hacked</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/wiki-section/products/sandbox</loc></url>
    <url><loc>https://www.kaspersky.com/antivirus-for-uefi</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/premium-support</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/apt-intelligence-reporting/subscribe</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/smartphones</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/systems-management-free-trial</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/solutions/iot-and-embedded-systems-security/transportation-security</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/cybercrime</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/bittorrent</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/infographics/android-threats</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/browser-hijacking</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/what-is-bloatware</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/top-10-computer-security-mistakes</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/cybersecurity-services</loc></url>
    <url><loc>https://www.kaspersky.com/about/careers/students-and-graduates</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/multiple-antivirus-products</loc></url>
    <url><loc>https://www.kaspersky.com/internet-security</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/removing-unwanted-adware</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/online-shopping-tips</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/contact-us</loc></url>
    <url><loc>https://www.kaspersky.com/about/law-enforcement-cooperation</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/cozyduke-apt</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/embedded-security-internet-of-things</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/rogue-antivirus</loc></url>
    <url><loc>https://www.kaspersky.com/total-security</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/epic-turla-snake-malware-attacks</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/shylock-banking-trojan-definition</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/top-7-ipad-security-tips</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/infographics/parental-control</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/endpoint-windows</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/hybrid-cloud-security</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/top-seven-mobile-security-threats-smart-phones-tablets-and-mobile-internet-devices-what-the-future-has-in-store</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/malware-damage</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/fraud-prevention</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/endpoint-detection-response-edr</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/avoiding-cell-phone-spyware-infestation</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/who-creates-malware</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/ccleaner-malware</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/professional-services</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/ddos-protection</loc></url>
    <url><loc>https://www.kaspersky.com/downloads/thank-you/free-rescue-disk</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/malware-classifications</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/operating-system-network</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/cloud-security</loc></url>
    <url><loc>https://www.kaspersky.com/antispam-software-development</loc></url>
    <url><loc>https://www.kaspersky.com/about/contact</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/poseidon</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/beta-bot</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/firewall</loc></url>
    <url><loc>https://www.kaspersky.com/partners</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/drive-by-download</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/types-of-spyware</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/teslacrypt</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/private-security-network</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/targeted-solutions</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/mail-security-appliance</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/what-is-a-whaling-attack</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/infographics/stealing-financial-data</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/security-training</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/man-in-the-middle-attack</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/microsoft-sharepoint</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/cosmicduke-malware-virus-definition</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/infographics/identity-theft-personal-data-infographic</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/why-does-my-computer-freeze</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/malware-implementation-techniques</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/security-assessment</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/file-server</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/metel</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/internet-gateway</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/national-cybersecurity</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/virtualization-hybrid-cloud</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/preemptive-safety-for-kids-social-media-safety</loc></url>
    <url><loc>https://www.kaspersky.com/partners/whitelist-program</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/black-hat-hacker</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/grey-business</loc></url>
    <url><loc>https://www.kaspersky.com/about/careers</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/torrentlocker-malware</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/iphone-encryption</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/what-is-the-clampi-virus</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/combating-antivirus</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/sms-attacks</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/endpoint-product</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/beware-online-dating-scams</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/spam-phishing</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/mac</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/patch-management</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/mobile</loc></url>
    <url><loc>https://www.kaspersky.com/android-security</loc></url>
    <url><loc>https://www.kaspersky.com/about/team</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/wiki-section/products/automatic-exploit-prevention-aep</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/brute-force-attack</loc></url>
    <url><loc>https://www.kaspersky.com/web-filter</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/threat-hunting</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/petty-theft</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/total</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/maltego-license-transforms</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/infographics/botnet</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/retail-cybersecurity</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/carbanak-apt</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/how-to-fend-off-a-computer-virus</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/antivirus-updates</loc></url>
    <url><loc>https://www.kaspersky.com/about/company</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/endpoint-advanced</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/mail-server</loc></url>
    <url><loc>https://www.kaspersky.com/phishing-url-data-feed</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/backup-files</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/end-user-license-agreement</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/endpoint-mac</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/utm</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/computer-viruses-vs-worms</loc></url>
    <url><loc>https://www.kaspersky.com/secure-connection</loc></url>
    <url><loc>https://www.kaspersky.com/partners/managed-service-provider</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/resources</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/malware-creators</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/heuristic-analysis</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/suspicious-packers</loc></url>
    <url><loc>https://www.kaspersky.com/about/careers/lab-formula</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/malware-system-penetration</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/collaboration-free-trial</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/mobile-free-trial</loc></url>
    <url><loc>https://www.kaspersky.com/about/data-protection</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/computer-operations</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/sql-injection</loc></url>
    <url><loc>https://www.kaspersky.com/home-security</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/industrial-solution</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/malware-social-engineering</loc></url>
    <url><loc>https://www.kaspersky.com/privacy</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/public-wifi-risks</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/security-center</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/boot-sector-virus</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/botnet-attacks</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/storage</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/contact-us/thank-you</loc></url>
    <url><loc>https://www.kaspersky.com/downloads/thank-you/secure-connection-pc</loc></url>
    <url><loc>https://www.kaspersky.com/safe-kids</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/how-to-report-a-website</loc></url>
    <url><loc>https://www.kaspersky.com/third-party-tracking</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/threat-management-defense-solution/demo</loc></url>
    <url><loc>https://www.kaspersky.com/password-manager</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/mobile</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/endpoint-select-free-trial</loc></url>
    <url><loc>https://www.kaspersky.com/downloads/thank-you/free-software-updater</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/tablet-security-safety</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/proxy-server</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/naikon-targeted-attacks</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/internet-safety-for-kids-social-media-safety</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/online-banking-theft</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/top-7-cyberthreats</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/wiki-section/products/anti-rootkit-and-remediation-technology</loc></url>
    <url><loc>https://www.kaspersky.com/android-security-free</loc></url>
    <url><loc>https://www.kaspersky.com/mobile-security-sdk</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/facebook</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/mac-vs-pc</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/desert-falcons-malware</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/what-is-malware-and-how-to-protect-against-it</loc></url>
    <url><loc>https://www.kaspersky.com/partners/vas</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/wiki-section/products/behavior-based-protection</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/zero-day-exploit</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/android-security-tips</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/trojans</loc></url>
    <url><loc>https://www.kaspersky.com/renewal-center/home</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/wiki-section/products/online-banking-the-safe-money-technology</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/kids-online-safety</loc></url>
    <url><loc>https://www.kaspersky.com/gdpr</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/collaboration</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/cookies</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/spyware</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/healthcare</loc></url>
    <url><loc>https://www.kaspersky.com/</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/gcman</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/malware-manipulation</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/malicious-code</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/threat-intelligence</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/msp-integrations</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/linux-bash-virus-threat</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/services</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/white-hat-hackers</loc></url>
    <url><loc>https://www.kaspersky.com/true-cybersecurity</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/industries</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/mobile-security-threats-on-the-move</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/online-shopping</loc></url>
    <url><loc>https://www.kaspersky.com/free-software-updater</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/power-of-a-password-manager</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/wiki-section/products/big-data-the-astraea-technology</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/resources</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/internet-gateway</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/what-is-bitcoin</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/mail-server-free-trial</loc></url>
    <url><loc>https://www.kaspersky.com/about</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/tyupkin-malware-atm-security-malware</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/apt-intelligence-reporting</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/removing-malicious-code</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/wiki-section/products/machine-learning-in-cybersecurity</loc></url>
    <url><loc>https://www.kaspersky.com/downloads/thank-you/internet-security-free-trial</loc></url>
    <url><loc>https://www.kaspersky.com/partners/technology/benefits</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/what-is-social-engineering</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/android-vs-iphone-mobile-security</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/wiki-section/products/kaspersky-endpoint-detection-and-response-edr</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/resource-for-virus-threats-definitions</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/storage-free-trial</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/wiki-section/products/multi-layered-approach-to-security</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/dns</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/lotus-notes-domino</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/macro-virus</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/wireless-network-security-simple-tips</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/blackenergy</loc></url>
    <url><loc>https://www.kaspersky.com/mac-virus-scan</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/data-theft</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/adwind</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/snapchat-hackers-five-ways-to-protect-your-family</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/ip-spoofing</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/infographics/parental-control-infographic</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/choose-the-right-cloud-antivirus</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/twitter-tips-for-parents-of-teens</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/darkhotel-malware-virus-threat-definition</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/industrial</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/mail-server-security</loc></url>
    <url><loc>https://www.kaspersky.com/web-privacy-policy</loc></url>
    <url><loc>https://www.kaspersky.com/anti-malware</loc></url>
    <url><loc>https://www.kaspersky.com/downloads/thank-you/free-virus-removal-tool</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/linux</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/antivirus-performance-vs-protection</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/endpoint-select</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/wiki-section/products/protecting-mobile-devices</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/storage</loc></url>
    <url><loc>https://www.kaspersky.com/transparency-center</loc></url>
    <url><loc>https://www.kaspersky.com/antivirus-sdk</loc></url>
    <url><loc>https://www.kaspersky.com/enterprise-security/anti-targeted-attack-platform</loc></url>
    <url><loc>https://www.kaspersky.com/botnet-monitoring-and-data-feeds</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/stealth-virus</loc></url>
    <url><loc>https://www.kaspersky.com/free-virus-scan</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/antivirus-malware-detection</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/threats/virus-delivery-methods</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/preemptive-safety/scam-websites</loc></url>
    <url><loc>https://www.kaspersky.com/small-to-medium-business-security/downloads/internet-gateway-free-trial</loc></url>
    <url><loc>https://www.kaspersky.com/resource-center/definitions/ip-and-email-spoofing</loc></url>
</urlset>
