From Wikipedia, the free encyclopedia
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
This is a list of pages in the scope of Wikipedia:WikiProject Computer Security along with pageviews.
To report bugs, please write on the Community tech bot talk page on Meta.
List
Period : 2025-06-01 to 2025-06-30
Total views : 4,758,561
Updated: 07:59, 6 July 2025 (UTC)
Rank
Page title
Views
Daily average
Assessment
Importance
1
HTTP cookie
214,413
7,147
C
High
2
Anonymous (hacker group)
81,306
2,710
GA
Mid
3
Pegasus (spyware)
71,248
2,374
B
Low
4
Have I Been Pwned?
65,696
2,189
Start
High
5
TamilRockers
64,420
2,147
Start
Low
6
Blockchain
62,461
2,082
B
Top
7
Phishing
57,850
1,928
B
High
8
Proxy server
50,637
1,687
B
High
9
WarGames
39,684
1,322
C
Low
10
Cryptography
37,231
1,241
C
Top
11
Secure Shell
37,162
1,238
C
High
12
List of Tor onion services
37,056
1,235
List
Low
13
Cloudflare
35,909
1,196
C
Low
14
Virtual private network
33,973
1,132
C
Mid
15
Reality Winner
32,356
1,078
B
Mid
16
DJI
28,714
957
C
Low
17
Self-driving car
27,258
908
B
Mid
18
Phone hacking
27,076
902
Start
Mid
19
Google hacking
26,770
892
Start
Low
20
Malware
26,226
874
C
Top
21
Multi-factor authentication
26,078
869
C
High
22
Russian interference in the 2016 United States elections
25,702
856
B
High
23
Facebook–Cambridge Analytica data scandal
24,602
820
C
High
24
Zero-day vulnerability
24,404
813
C
High
25
Kevin Mitnick
24,081
802
C
High
26
Man-in-the-middle attack
23,164
772
C
Mid
27
Swatting
22,790
759
C
Mid
28
Lolita City
21,980
732
Start
Low
29
SQL injection
20,991
699
Start
High
30
CrowdStrike
20,832
694
B
Mid
31
Hackers (film)
20,249
674
C
Low
32
ILOVEYOU
19,532
651
C
Mid
33
Cybercrime
19,358
645
C
High
34
Palo Alto Networks
19,200
640
C
High
35
Reverse engineering
18,727
624
C
High
36
Lazarus Group
18,436
614
C
Mid
37
Pretty Good Privacy
18,250
608
B
High
38
Privacy
18,190
606
C
High
39
Vault 7
17,997
599
C
Unknown
40
Adobe Flash
17,752
591
C
Low
41
Operation Olympic Games
17,728
590
Start
Mid
42
BIOS
17,683
589
B
Mid
43
Software testing
17,578
585
C
Low
44
Aladdin (BlackRock)
17,545
584
Stub
Low
45
Cross-site request forgery
17,333
577
C
High
46
Cryptographic hash function
17,310
577
C
High
47
Sneakers (1992 film)
17,207
573
B
Low
48
Kali Linux
16,239
541
Start
Mid
49
Timeline of events associated with Anonymous
15,476
515
C
Low
50
Information security
15,264
508
B
Top
51
Social engineering (security)
15,150
505
C
High
52
Cross-site scripting
15,037
501
B
High
53
Ransomware
14,973
499
GA
High
54
Password manager
14,816
493
C
Mid
55
Kerberos (protocol)
14,802
493
C
High
56
VirusTotal
14,560
485
Start
High
57
Certificate authority
14,163
472
C
High
58
List of the most common passwords
13,888
462
List
Unknown
59
Trusted Platform Module
13,616
453
C
High
60
Security hacker
13,114
437
C
Top
61
NSO Group
13,074
435
B
Mid
62
Human–computer interaction
12,915
430
C
Low
63
Time-based one-time password
12,848
428
C
High
64
Startpage
12,830
427
C
Low
65
OAuth
12,813
427
C
Mid
66
Mail and wire fraud
12,776
425
Start
Mid
67
Single sign-on
12,696
423
C
High
68
ReCAPTCHA
12,395
413
B
Mid
69
List of data breaches
12,286
409
List
High
70
Keychain (software)
12,223
407
Start
Low
71
Ashley Madison data breach
12,213
407
Start
Mid
72
Okta, Inc.
12,123
404
Start
Mid
73
Race condition
12,075
402
C
Mid
74
Zip bomb
12,018
400
Start
Low
75
Public key infrastructure
12,017
400
C
High
76
Automatic Certificate Management Environment
11,919
397
Start
Low
77
News International phone hacking scandal
11,857
395
C
Mid
78
Phreaking
11,830
394
C
Mid
79
Salt Typhoon
11,819
393
C
Unknown
80
EICAR test file
11,672
389
C
Low
81
Tails (operating system)
11,547
384
Start
Mid
82
Data breach
11,489
382
GA
Mid
83
Playpen (website)
11,293
376
Start
Low
84
Trojan horse (computing)
11,269
375
C
High
85
Spyware
11,240
374
B
High
86
White hat (computer security)
11,181
372
Start
Low
87
STRIDE model
11,094
369
Start
Low
88
Authentication
11,072
369
C
High
89
Cyberwarfare
11,025
367
C
High
90
Zscaler
10,826
360
Start
Low
91
2014 Sony Pictures hack
10,695
356
C
High
92
Brute-force attack
10,650
355
C
High
93
Honeypot (computing)
10,498
349
Start
High
94
Payment Card Industry Data Security Standard
10,428
347
Start
Low
95
Electronic voting in India
10,367
345
GA
High
96
Risk
10,343
344
C
Top
97
Return-oriented programming
10,304
343
C
High
98
Wiz, Inc.
10,257
341
Start
Low
99
Zero trust architecture
10,109
336
C
High
100
End-to-end encryption
10,080
336
C
Mid
101
Hardware security module
9,946
331
Start
Mid
102
Synopsys
9,875
329
B
Mid
103
Sony BMG copy protection rootkit scandal
9,841
328
B
Low
104
Advanced persistent threat
9,831
327
B
High
105
Role-based access control
9,754
325
C
Mid
106
Integer overflow
9,691
323
Start
Unknown
107
Bitwarden
9,596
319
C
Mid
108
VeraCrypt
9,501
316
C
High
109
Same-origin policy
9,489
316
Start
High
110
Fortinet
9,468
315
C
Mid
111
OpenBSD
9,451
315
B
High
112
SIM swap scam
9,361
312
Start
Mid
113
Hacktivism
9,207
306
C
High
114
YubiKey
9,154
305
Start
Low
115
Protection ring
8,916
297
B
High
116
Maia arson crimew
8,891
296
GA
Low
117
Children's Online Privacy Protection Act
8,763
292
Start
Low
118
Cyberspace
8,747
291
C
High
119
Electronic Frontier Foundation
8,738
291
C
High
120
Morris worm
8,726
290
C
High
121
DMZ (computing)
8,656
288
Start
High
122
Internet leak
8,496
283
C
High
123
Gary McKinnon
8,350
278
C
High
124
Script kiddie
8,337
277
Start
Mid
125
Kill switch
8,279
275
C
Low
126
Keystroke logging
8,277
275
C
Low
127
United States Cyber Command
8,208
273
B
High
128
Intel Management Engine
8,160
272
C
High
129
Penetration test
8,109
270
C
Mid
130
Microsoft Defender Antivirus
8,048
268
C
Mid
131
Botnet
7,983
266
C
High
132
Common Vulnerabilities and Exposures
7,959
265
C
Top
133
OpenID
7,943
264
B
Low
134
Buffer overflow
7,883
262
B
High
135
Federal Information Processing Standards
7,801
260
Start
Low
136
Operation Trojan Shield
7,729
257
C
Low
137
Lightning Network
7,613
253
Start
Low
138
KeePass
7,447
248
C
Mid
139
Software cracking
7,424
247
Start
Mid
140
Security-Enhanced Linux
7,379
245
C
High
141
Web cache
7,294
243
Start
Low
142
ChaCha20-Poly1305
7,176
239
C
Low
143
Petya (malware family)
7,167
238
C
High
144
Malwarebytes (software)
7,165
238
C
Mid
145
Access control
7,026
234
C
High
146
Red team
7,022
234
GA
Low
147
Dynamic-link library
7,019
233
C
Unknown
148
Jay Chaudhry
6,998
233
Stub
Low
149
Identity and access management
6,944
231
C
High
150
ID.me
6,942
231
Start
Low
151
Moxie Marlinspike
6,929
230
B
Low
152
Black hat (computer security)
6,886
229
C
Mid
153
Whitelist
6,883
229
Start
Low
154
Right to privacy
6,849
228
C
High
155
Sudo
6,846
228
B
Low
156
Darktrace
6,708
223
Start
Low
157
Electronic voting
6,690
223
C
Unknown
158
Bangladesh Bank robbery
6,627
220
C
Low
159
CyberArk
6,562
218
C
Low
160
Email spoofing
6,558
218
Start
Mid
161
Nmap
6,542
218
C
Mid
162
RADIUS
6,539
217
C
Mid
163
Backdoor (computing)
6,524
217
C
Mid
164
1Password
6,509
216
C
Low
165
CCleaner
6,504
216
C
High
166
LulzSec
6,491
216
B
High
167
Adrian Lamo
6,445
214
C
High
168
Scammer Payback
6,431
214
Start
Mid
169
List of warez groups
6,312
210
Start
Mid
170
Wi-Fi Protected Setup
6,253
208
C
Mid
171
Podesta emails
6,239
207
C
Low
172
Timeline of computer viruses and worms
6,195
206
Start
High
173
Clickjacking
6,147
204
B
Mid
174
The Tor Project
6,124
204
C
Top
175
Tiny Banker Trojan
6,080
202
C
Low
176
Climatic Research Unit email controversy
6,039
201
B
Low
177
OWASP
6,032
201
C
Low
178
Access-control list
6,015
200
Start
High
179
Len Sassaman
5,969
198
C
Low
180
Security through obscurity
5,959
198
C
Mid
181
Low Orbit Ion Cannon
5,934
197
Start
Low
182
Fancy Bear
5,907
196
C
High
183
Weev
5,891
196
C
Low
184
SentinelOne
5,861
195
Start
Unknown
185
File-system permissions
5,845
194
C
High
186
The Cuckoo's Egg (book)
5,817
193
Start
Low
187
Log4Shell
5,783
192
C
Mid
188
List of hacker groups
5,704
190
Start
Mid
189
Certified Information Systems Security Professional
5,693
189
C
Mid
190
Address space layout randomization
5,683
189
C
High
191
Off-by-one error
5,671
189
Start
Unknown
192
Microsoft Intune
5,651
188
Start
Mid
193
List of security hacking incidents
5,634
187
List
High
194
Hybrid warfare
5,631
187
C
High
195
Common Vulnerability Scoring System
5,553
185
C
High
196
Null character
5,525
184
Start
Mid
197
Credential stuffing
5,503
183
C
High
198
Avast Antivirus
5,492
183
Start
Mid
199
Zero Days
5,459
181
Start
Low
200
Cyber Resilience Act
5,342
178
C
Low
201
Infostealer
5,338
177
B
Low
202
Avast
5,270
175
B
Mid
203
Trellix
5,262
175
B
Mid
204
BlackCat (cyber gang)
5,259
175
Start
Low
205
Marcus Hutchins
5,253
175
B
Mid
206
Jim Browning (YouTuber)
5,228
174
Start
Low
207
IDN homograph attack
5,207
173
C
Mid
208
Personal identification number
5,181
172
C
High
209
NIST Cybersecurity Framework
5,174
172
Start
Top
210
Sophos
5,171
172
Start
Mid
211
IntelBroker
5,158
171
B
Low
212
Replay attack
5,146
171
C
High
213
Fork (blockchain)
5,123
170
Start
Low
214
Searx
5,070
169
C
Unknown
215
Row hammer
4,964
165
GA
Low
216
Metasploit
4,943
164
C
Mid
217
Paywall
4,926
164
C
Mid
218
Brain (computer virus)
4,904
163
C
Low
219
2016 Democratic National Committee email leak
4,833
161
C
Mid
220
Cyberwarfare and Iran
4,811
160
Start
Mid
221
Code injection
4,804
160
C
High
222
Lattice-based cryptography
4,763
158
Start
Low
223
DNS sinkhole
4,761
158
Start
Unknown
224
Cold boot attack
4,758
158
C
Low
225
KeePassXC
4,755
158
Start
Low
226
Mutual authentication
4,664
155
Stub
Low
227
Attribute-based access control
4,659
155
C
Mid
228
Patch Tuesday
4,652
155
C
Mid
229
NTLM
4,645
154
C
Mid
230
Object-capability model
4,625
154
Start
Mid
231
Pegasus Project (investigation)
4,624
154
C
Low
232
Nintendo data leak
4,615
153
C
Low
233
Web of trust
4,611
153
C
Low
234
2017 Ukraine ransomware attacks
4,597
153
C
High
235
Norton AntiVirus
4,550
151
C
Mid
236
Fake news website
4,518
150
C
Low
237
John the Ripper
4,470
149
Start
Low
238
Collision avoidance system
4,442
148
C
Mid
239
Xbox Underground
4,437
147
C
Low
240
Let's Encrypt
4,431
147
B
Low
241
Chinese wall
4,415
147
C
Low
242
Chaos Computer Club
4,411
147
C
Mid
243
Fail2ban
4,410
147
Start
Mid
244
Burp Suite
4,379
145
Start
Low
245
Billion laughs attack
4,373
145
Start
Low
246
Business continuity planning
4,361
145
B
Mid
247
Tiger team
4,353
145
Start
Unknown
248
ClamAV
4,341
144
Start
Unknown
249
Dahua Technology
4,338
144
B
Low
250
CalyxOS
4,332
144
C
Low
251
LockBit
4,271
142
C
High
252
Weird machine
4,253
141
Stub
Low
253
Mitigation
4,235
141
Start
Mid
254
Internet security
4,187
139
C
High
255
Samsung Knox
4,170
139
Start
Mid
256
Flame (malware)
4,157
138
C
Mid
257
SpyEye
4,145
138
Stub
Unknown
258
SAML 2.0
4,137
137
C
Low
259
Mydoom
4,121
137
Start
Mid
260
ActionScript
4,117
137
C
Low
261
Ungoogled-chromium
4,093
136
Start
Low
262
Conficker
4,089
136
B
Mid
263
Threat model
4,085
136
Start
Low
264
Cozy Bear
4,085
136
C
Mid
265
Mirror site
4,077
135
C
Mid
266
Digital forensics
4,024
134
GA
High
267
Security token
4,008
133
C
High
268
Lapsus$
4,004
133
C
Low
269
2011 PlayStation Network outage
3,994
133
C
Mid
270
Time-of-check to time-of-use
3,978
132
Start
Low
271
Obfuscation (software)
3,975
132
C
Mid
272
ESET
3,946
131
Start
Low
273
Computer and network surveillance
3,899
129
C
Top
274
Bruce Schneier
3,860
128
Start
High
275
Kill chain (military)
3,851
128
Start
Unknown
276
Timing attack
3,798
126
C
Mid
277
Evaluation Assurance Level
3,795
126
Start
Low
278
Bug bounty program
3,788
126
C
High
279
Creeper and Reaper
3,785
126
Start
Low
280
NSAKEY
3,763
125
C
High
281
Ron Rivest
3,761
125
Start
High
282
ISACA
3,760
125
Start
Low
283
Hector Monsegur
3,752
125
Start
Low
284
Data security
3,750
125
Start
High
285
Jonathan James
3,742
124
Start
Low
286
Proofpoint, Inc.
3,736
124
Start
Low
287
Intel Active Management Technology
3,731
124
C
High
288
Cyberwarfare by Russia
3,728
124
B
High
289
Port scanner
3,709
123
B
High
290
The Artifice Girl
3,692
123
Start
Low
291
Albert Gonzalez
3,687
122
C
Mid
292
Brian Krebs
3,675
122
Start
Low
293
Technical support scam
3,653
121
GA
Mid
294
Memory safety
3,607
120
C
Low
295
Wickr
3,578
119
C
Mid
296
Voice phishing
3,563
118
Stub
Mid
297
Radia Perlman
3,552
118
C
Mid
298
Iptables
3,550
118
C
Mid
299
List of cybercriminals
3,529
117
List
Mid
300
Cult of the Dead Cow
3,495
116
C
Mid
301
Confused deputy problem
3,483
116
Start
High
302
File inclusion vulnerability
3,477
115
Start
Mid
303
Shellshock (software bug)
3,469
115
C
High
304
Dan Kaminsky
3,467
115
B
Mid
305
Vendor
3,429
114
Start
Low
306
Bread Financial
3,419
113
Start
Low
307
Content Security Policy
3,415
113
C
High
308
LastPass
3,398
113
Start
Low
309
Physical security
3,376
112
C
Top
310
Evil maid attack
3,345
111
C
Mid
311
Shamoon
3,342
111
Start
Mid
312
Root certificate
3,335
111
Start
Mid
313
Dictionary attack
3,297
109
C
High
314
Cyber kill chain
3,293
109
Start
Mid
315
Blacklist (computing)
3,290
109
Start
Mid
316
Buffer overflow protection
3,256
108
C
Mid
317
Netfilter
3,253
108
C
Mid
318
Aubrey Cottle
3,248
108
C
Mid
319
ISC2
3,240
108
Start
Mid
320
Mandatory access control
3,239
107
C
High
321
Arbitrary code execution
3,232
107
C
High
322
Contingency plan
3,205
106
Start
High
323
Daniel J. Bernstein
3,187
106
C
Mid
324
BGP hijacking
3,184
106
Stub
Mid
325
Bell–LaPadula model
3,178
105
C
Low
326
OneTrust
3,177
105
C
Low
327
Computer forensics
3,167
105
C
High
328
Voter-verified paper audit trail
3,160
105
C
High
329
Privacy law
3,160
105
Start
High
330
Hacker ethic
3,151
105
C
High
331
Jeremy Hammond
3,148
104
C
Low
332
DarkMatter Group
3,138
104
C
Low
333
Yahoo data breaches
3,137
104
GA
Mid
334
Email hacking
3,132
104
Start
Mid
335
23andMe data leak
3,130
104
Start
Low
336
Dmitri Alperovitch
3,108
103
C
Low
337
Nulled
3,108
103
Start
Unknown
338
Troy Hunt
3,095
103
Start
Low
339
Wardialing
3,094
103
Start
Unknown
340
List of cyberattacks
3,087
102
List
High
341
Russian interference in the 2024 United States elections
3,064
102
C
Low
342
Mark of the Web
3,021
100
Start
Low
343
Network security
3,000
100
Start
High
344
AVG AntiVirus
2,994
99
Start
Low
345
Certificate Transparency
2,980
99
C
High
346
Third-party cookies
2,975
99
C
Low
347
Electronic voting by country
2,961
98
C
Unknown
348
Slopsquatting
2,956
98
C
Low
349
MAC spoofing
2,952
98
Start
Unknown
350
Code Red (computer worm)
2,913
97
Start
Low
351
Endpoint detection and response
2,912
97
Start
Low
352
Forcepoint
2,905
96
Start
Unknown
353
Operation Aurora
2,900
96
C
Mid
354
Open banking
2,892
96
C
Low
355
Drive-by download
2,876
95
Start
High
356
Dangling pointer
2,874
95
C
Mid
357
List of password managers
2,844
94
List
Low
358
The Crash (2017 film)
2,829
94
Start
Low
359
Duqu
2,812
93
C
Mid
360
Bluesnarfing
2,805
93
Start
Low
361
Certified ethical hacker
2,800
93
Start
Low
362
Shellcode
2,777
92
B
High
363
Hacker Manifesto
2,768
92
Start
Mid
364
Team Xecuter
2,765
92
Start
Low
365
Offensive Security
2,764
92
C
Low
366
Common Criteria
2,743
91
Start
Low
367
Non-repudiation
2,720
90
Start
Mid
368
Four Horsemen of the Infocalypse
2,719
90
Start
Low
369
Nunes memo
2,713
90
B
Low
370
Cloud computing security
2,702
90
Start
Unknown
371
Dr.Web
2,701
90
Start
Low
372
Capability-based security
2,693
89
Start
High
373
Smurf attack
2,691
89
C
Mid
374
Secure by design
2,688
89
Start
High
375
Akira (ransomware)
2,676
89
Stub
Low
376
Kevin Poulsen
2,666
88
Start
Mid
377
CIH (computer virus)
2,663
88
Start
Low
378
Briar (software)
2,645
88
Start
Low
379
Opportunistic TLS
2,640
88
Start
Mid
380
Blaster (computer worm)
2,629
87
Start
Low
381
Cain and Abel (software)
2,628
87
Start
Low
382
Van Eck phreaking
2,617
87
C
Low
383
ATT&CK
2,575
85
Stub
Low
384
Scareware
2,561
85
Start
Mid
385
AACS encryption key controversy
2,556
85
GA
Low
386
Offensive Security Certified Professional
2,545
84
Start
Mid
387
COBIT
2,523
84
Start
High
388
Data retention
2,501
83
C
Low
389
SwiftOnSecurity
2,497
83
Stub
Low
390
DDoS attacks on Dyn
2,489
82
C
Mid
391
BeyondTrust
2,486
82
Stub
Low
392
2600: The Hacker Quarterly
2,484
82
Start
Mid
393
Jacob Appelbaum
2,469
82
B
Low
394
Hack Forums
2,465
82
C
Low
395
Melissa (computer virus)
2,461
82
Start
Unknown
396
PLA Unit 61398
2,453
81
Start
Mid
397
Nessus (software)
2,449
81
Start
Low
398
Cyberwarfare and China
2,408
80
C
High
399
Ping of death
2,388
79
Start
Low
400
Cyberweapon
2,382
79
Start
High
401
Data loss prevention software
2,378
79
Start
Mid
402
Avira
2,363
78
C
Low
403
Pseudonymization
2,360
78
Start
Unknown
404
Office of Personnel Management data breach
2,358
78
C
High
405
Security-focused operating system
2,354
78
List
Mid
406
Click fraud
2,352
78
C
Low
407
DREAD (risk assessment model)
2,328
77
Start
Low
408
Markus Hess
2,322
77
Start
Low
409
BREACH
2,317
77
Start
High
410
GhostNet
2,315
77
C
Mid
411
2015 Ukraine power grid hack
2,308
76
C
Mid
412
Shoulder surfing (computer security)
2,303
76
C
Low
413
Mark Abene
2,290
76
Start
Mid
414
Chief information security officer
2,289
76
Start
Mid
415
DarkSide (hacker group)
2,289
76
Start
Low
416
Mermaids (charity)
2,279
75
Start
Low
417
Chaos Communication Congress
2,262
75
Start
Low
418
Dark0de
2,234
74
Start
Mid
419
Keeper (password manager)
2,230
74
Start
Low
420
Indian WhatsApp lynchings
2,229
74
List
High
421
Tanium
2,201
73
Start
Low
422
FIPS 140
2,200
73
Start
Low
423
Application security
2,192
73
Start
High
424
Threat actor
2,192
73
C
Mid
425
SANS Institute
2,191
73
Start
Mid
426
New generation warfare
2,184
72
Start
Low
427
Comparison of computer viruses
2,178
72
List
High
428
Whiz Kids (TV series)
2,163
72
C
Low
429
CRIME
2,154
71
Start
High
430
Darik's Boot and Nuke
2,142
71
Start
Unknown
431
Federated identity
2,134
71
Start
High
432
ISO/IEC 27002
2,124
70
Stub
Low
433
Attack surface
2,119
70
Stub
Mid
434
Acceptable use policy
2,115
70
Start
Mid
435
Mikko Hyppönen
2,107
70
C
Low
436
Supersingular isogeny key exchange
2,106
70
Start
Low
437
Goatse Security
2,105
70
Start
Low
438
Fake news websites in the United States
2,099
69
B
High
439
Information security standards
2,093
69
C
Top
440
2007 cyberattacks on Estonia
2,076
69
Start
High
441
Comparison of instant messaging protocols
2,072
69
List
Low
442
CYREN
2,068
68
B
Mid
443
Fufufafa
2,068
68
C
Unknown
444
Entrust
2,065
68
Start
Unknown
445
SiegedSec
2,062
68
C
Low
446
List of spyware programs
2,061
68
Start
Low
447
Virus hoax
2,056
68
C
Low
448
Cellebrite UFED
2,048
68
C
Low
449
Snort (software)
2,047
68
Start
Mid
450
Legion of Doom (hacker group)
2,036
67
Start
Low
451
EPrivacy Directive
2,033
67
C
Low
452
Authentication, authorization, and accounting
2,019
67
Start
Mid
453
Microsoft Security Essentials
2,013
67
C
Mid
454
Control-flow integrity
2,011
67
C
High
455
Bureau 121
2,010
67
C
Low
456
Rogue security software
2,009
66
C
High
457
Browser hijacking
2,007
66
C
High
458
Communications security
2,001
66
Start
Mid
459
Mobile security
1,995
66
C
Top
460
Gutmann method
1,990
66
C
Mid
461
Hashcat
1,982
66
C
Low
462
FIPS 140-3
1,981
66
C
Low
463
Hackers: Heroes of the Computer Revolution
1,975
65
Start
Low
464
Webroot
1,952
65
Start
Low
465
Cyber-security regulation
1,947
64
C
High
466
Carbanak
1,946
64
Start
Low
467
Computer emergency response team
1,945
64
Start
High
468
Secure cryptoprocessor
1,941
64
C
Mid
469
Coordinated vulnerability disclosure
1,941
64
Stub
High
470
Self-destruct
1,937
64
C
Low
471
Diameter (protocol)
1,928
64
Start
Low
472
Email privacy
1,921
64
C
Mid
473
Spy pixel
1,920
64
C
Low
474
List of compact discs sold with Extended Copy Protection
1,919
63
List
Low
475
Cybersecurity Maturity Model Certification
1,915
63
C
Low
476
CryptoLocker
1,909
63
C
Mid
477
SQL Slammer
1,898
63
Start
Low
478
List of cyber warfare forces
1,890
63
Start
Low
479
Dropper (malware)
1,889
62
Stub
Mid
480
Next-generation firewall
1,889
62
Start
Low
481
Security.txt
1,888
62
Start
Low
482
Market for zero-day exploits
1,885
62
C
High
483
Trishneet Arora
1,878
62
Start
Low
484
HackThisSite
1,855
61
C
Low
485
Dynamic application security testing
1,853
61
Start
Low
486
Google Safe Browsing
1,843
61
Start
Unknown
487
Encrypting File System
1,841
61
B
Mid
488
List of computer security certifications
1,839
61
List
Mid
489
Ankit Fadia
1,811
60
Start
Low
490
Interdiction
1,809
60
Start
Low
491
360 Total Security
1,806
60
Start
Low
492
Trust on first use
1,806
60
Start
Low
493
Roman Seleznev
1,804
60
Start
Low
494
Secure cookie
1,800
60
Start
High
495
Access token
1,799
59
Start
Mid
496
Trusted timestamping
1,799
59
Start
Unknown
497
BusKill
1,795
59
Start
Low
498
Key server (cryptographic)
1,787
59
Start
Mid
499
Reception and criticism of WhatsApp security and privacy features
1,786
59
C
Low
500
Chain of trust
1,781
59
Start
Mid