Jump to content

Wikipedia:WikiProject Computer security/Popular pages

From Wikipedia, the free encyclopedia

This is a list of pages in the scope of Wikipedia:WikiProject Computer Security along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

List

[edit]

Period: 2025-03-01 to 2025-03-31

Total views: 5,723,215

Updated: 11:11, 6 April 2025 (UTC)

Rank Page title Views Daily average Assessment Importance
1 HTTP cookie 262,663 8,473 C High
2 Wiz, Inc. 169,472 5,466 Start Low
3 Anonymous (hacker group) 121,794 3,928 GA Mid
4 Reality Winner 112,478 3,628 B Mid
5 Blockchain 88,522 2,855 B Top
6 Phishing 66,423 2,142 B High
7 Zero-day vulnerability 64,869 2,092 C High
8 ILOVEYOU 63,098 2,035 C Mid
9 Moxie Marlinspike 58,255 1,879 B Low
10 Pegasus (spyware) 58,085 1,873 B Low
11 Swatting 51,046 1,646 C Mid
12 Proxy server 48,685 1,570 B High
13 TamilRockers 48,312 1,558 Start Low
14 Russian interference in the 2016 United States elections 48,226 1,555 B High
15 WarGames 45,652 1,472 C Low
16 Lazarus Group 44,955 1,450 C Mid
17 Virtual private network 44,650 1,440 C Mid
18 List of Tor onion services 44,098 1,422 List Low
19 Maia arson crimew 42,775 1,379 GA Low
20 Self-driving car 41,116 1,326 B Mid
21 Secure Shell 38,827 1,252 C Low
22 Cryptography 38,648 1,246 C Top
23 Kevin Mitnick 35,406 1,142 C High
24 Facebook–Cambridge Analytica data scandal 34,542 1,114 C High
25 Cloudflare 34,430 1,110 C Low
26 DJI 30,366 979 C Low
27 Timeline of events associated with Anonymous 29,780 960 C Low
28 Lolita City 29,182 941 Start Low
29 Multi-factor authentication 28,049 904 C High
30 CrowdStrike 26,714 861 B Mid
31 Zip bomb 26,546 856 Start Low
32 Man-in-the-middle attack 25,301 816 C Mid
33 Malware 24,800 800 C Top
34 SQL injection 23,933 772 Start High
35 Cybercrime 23,417 755 C High
36 Hackers (film) 23,250 750 C Low
37 Pretty Good Privacy 22,685 731 B High
38 Payment Card Industry Data Security Standard 22,433 723 Start Low
39 Adobe Flash 22,248 717 C Low
40 Kali Linux 22,174 715 Start Mid
41 Cryptographic hash function 21,272 686 C High
42 Cross-site request forgery 21,196 683 C High
43 Privacy 21,027 678 C High
44 BIOS 19,455 627 B Mid
45 VirusTotal 19,030 613 Start High
46 Palo Alto Networks 18,960 611 C High
47 Software testing 18,789 606 C Low
48 Sneakers (1992 film) 18,773 605 B Low
49 Ransomware 18,570 599 GA High
50 Cross-site scripting 18,565 598 B High
51 Mail and wire fraud 18,481 596 Start Mid
52 Trusted Platform Module 17,712 571 C High
53 OAuth 17,689 570 C Mid
54 Have I Been Pwned? 17,357 559 Start High
55 Single sign-on 17,318 558 C High
56 Penetration test 17,199 554 C Mid
57 Trojan horse (computing) 16,892 544 C High
58 Reverse engineering 16,785 541 C High
59 Social engineering (security) 16,672 537 C High
60 Startpage.com 16,536 533 C Low
61 Google hacking 16,361 527 Start Low
62 Tails (operating system) 15,816 510 Start Mid
63 Salt Typhoon 15,777 508 C Unknown
64 Certificate authority 15,740 507 C High
65 Phone hacking 15,726 507 Start Mid
66 Kerberos (protocol) 15,472 499 C High
67 Script kiddie 15,310 493 Start Mid
68 Information security 15,300 493 B Top
69 Aladdin (BlackRock) 15,292 493 Stub Low
70 Playpen (website) 15,249 491 Start Low
71 Time-based one-time password 15,226 491 C High
72 ReCAPTCHA 15,138 488 B Mid
73 STRIDE model 15,122 487 Start Low
74 Ashley Madison data breach 14,867 479 Start Mid
75 EICAR test file 14,806 477 C Low
76 2600: The Hacker Quarterly 14,685 473 Start Mid
77 List of the most common passwords 14,317 461 List Unknown
78 Keychain (software) 14,079 454 Start Low
79 Automatic Certificate Management Environment 14,062 453 Start Low
80 Kill switch 13,906 448 C Low
81 2014 Sony Pictures hack 13,748 443 C High
82 Bitwarden 13,555 437 C Mid
83 End-to-end encryption 13,448 433 C Mid
84 Okta, Inc. 13,077 421 Start Mid
85 List of data breaches 13,020 420 List High
86 News International phone hacking scandal 12,998 419 C Mid
87 Synopsys 12,783 412 B Mid
88 Race condition 12,681 409 C Mid
89 White hat (computer security) 12,665 408 Start Low
90 Security hacker 12,641 407 C Top
91 Public key infrastructure 12,615 406 C High
92 United States Cyber Command 12,439 401 B High
93 Zero trust architecture 12,383 399 C High
94 SIM swap scam 12,327 397 Start Mid
95 Operation Trojan Shield 12,204 393 C Low
96 Advanced persistent threat 12,123 391 B High
97 DMZ (computing) 11,998 387 Start High
98 Fortinet 11,895 383 C Mid
99 Electronic voting in India 11,828 381 GA High
100 Human–computer interaction 11,823 381 C Low
101 ID.me 11,682 376 Start Low
102 Phreaking 11,673 376 C Mid
103 Vault 7 11,662 376 C Unknown
104 ChaCha20-Poly1305 11,314 364 C Low
105 Risk 11,245 362 C Top
106 Security through obscurity 11,219 361 C Mid
107 Role-based access control 11,043 356 C Mid
108 Integer overflow 10,974 354 Start Unknown
109 Zscaler 10,615 342 Start Low
110 Podesta emails 10,525 339 C Low
111 OpenBSD 10,468 337 B High
112 NSO Group 10,450 337 B Mid
113 VeraCrypt 10,402 335 C High
114 Microsoft Defender Antivirus 10,334 333 C Mid
115 Aubrey Cottle 10,219 329 C Mid
116 Brute-force attack 10,177 328 C High
117 Electronic Frontier Foundation 10,078 325 C High
118 Authentication 9,995 322 C High
119 Hacker Manifesto 9,877 318 Start Mid
120 Morris worm 9,784 315 C High
121 Low Orbit Ion Cannon 9,600 309 Start Low
122 Honeypot (computing) 9,531 307 Start High
123 Identity and access management 9,529 307 C High
124 Data breach 9,526 307 GA Mid
125 OWASP 9,465 305 C Low
126 YubiKey 9,455 305 Start Low
127 Common Vulnerabilities and Exposures 9,395 303 C Top
128 Russian interference in the 2024 United States elections 9,382 302 C Low
129 Password manager 9,371 302 C Mid
130 Cyberwarfare 9,357 301 C High
131 Spyware 9,354 301 B High
132 Children's Online Privacy Protection Act 9,341 301 Start Low
133 Black hat (computer security) 9,134 294 C Mid
134 Intel Management Engine 8,986 289 C High
135 LulzSec 8,947 288 B High
136 Botnet 8,866 286 C High
137 1Password 8,823 284 C Low
138 Legion of Doom (hacker group) 8,754 282 Start Low
139 Same-origin policy 8,708 280 Start High
140 Billion laughs attack 8,598 277 Start Low
141 Hacktivism 8,543 275 C High
142 2016 Democratic National Committee email leak 8,542 275 C Mid
143 Hardware security module 8,530 275 Start Mid
144 Security-Enhanced Linux 8,465 273 C High
145 RADIUS 8,446 272 C Mid
146 Tiger team 8,445 272 Start Unknown
147 Loyd Blankenship 8,402 271 Stub Low
148 KeePass 8,375 270 C Mid
149 Federal Information Processing Standards 8,367 269 Start Low
150 Dynamic-link library 8,366 269 C Unknown
151 Gary McKinnon 8,361 269 C High
152 OpenID 8,276 266 B Low
153 Off-by-one error 8,254 266 Start Unknown
154 23andMe data leak 8,239 265 Start Low
155 Timeline of computer viruses and worms 8,211 264 Start High
156 Scammer Payback 8,209 264 Start Mid
157 Fancy Bear 8,060 260 C High
158 Bangladesh Bank robbery 8,055 259 C Low
159 Searx 8,016 258 C Unknown
160 Wi-Fi Protected Setup 7,965 256 C Mid
161 Right to privacy 7,958 256 C High
162 Trellix 7,940 256 B Mid
163 Protection ring 7,932 255 B High
164 Yahoo data breaches 7,871 253 GA Mid
165 Malwarebytes (software) 7,823 252 C Mid
166 Microsoft Intune 7,795 251 Start Mid
167 Buffer overflow 7,745 249 B High
168 Common Vulnerability Scoring System 7,652 246 C High
169 Nmap 7,575 244 C Mid
170 Root certificate 7,538 243 Start Mid
171 Petya (malware family) 7,463 240 C High
172 Red team 7,379 238 GA Low
173 The Tor Project 7,356 237 C Top
174 Keystroke logging 7,293 235 C Low
175 Sudo 7,282 234 B Low
176 Software cracking 7,198 232 Start Mid
177 Avast Antivirus 7,137 230 Start Mid
178 Email spoofing 7,051 227 Start Mid
179 Ungoogled-chromium 7,028 226 Start Low
180 List of hacker groups 6,967 224 Start Mid
181 Certified Information Systems Security Professional 6,942 223 C Mid
182 CCleaner 6,932 223 C High
183 Avast 6,900 222 B Mid
184 Jim Browning (YouTuber) 6,871 221 Start Low
185 Log4Shell 6,824 220 C Mid
186 List of warez groups 6,821 220 Start Mid
187 Cyberspace 6,783 218 C High
188 Hybrid warfare 6,749 217 C High
189 Metasploit 6,728 217 C Mid
190 Backdoor (computing) 6,668 215 C Mid
191 2011 PlayStation Network outage 6,592 212 C Mid
192 File-system permissions 6,587 212 C High
193 Sophos 6,579 212 Start Mid
194 Address space layout randomization 6,449 208 C High
195 Adrian Lamo 6,429 207 C High
196 NIST Cybersecurity Framework 6,428 207 Start Top
197 SentinelOne 6,395 206 Start Unknown
198 KeePassXC 6,375 205 Start Low
199 CyberArk 6,371 205 C Low
200 Weev 6,366 205 C Low
201 Lattice-based cryptography 6,359 205 Start Low
202 Credential stuffing 6,358 205 C High
203 Access control 6,332 204 C High
204 Burp Suite 6,308 203 Start Low
205 LockBit 6,297 203 C High
206 Access-control list 6,240 201 Start High
207 John the Ripper 6,232 201 Start Low
208 SAML 2.0 6,221 200 C Low
209 Web cache 6,217 200 Start Low
210 Lightning Network 6,164 198 Start Low
211 Paywall 5,915 190 C Mid
212 List of security hacking incidents 5,896 190 List High
213 Lapsus$ 5,830 188 C Low
214 Norton AntiVirus 5,802 187 C Mid
215 Mydoom 5,794 186 Start Mid
216 Mutual authentication 5,741 185 Stub Low
217 Let's Encrypt 5,731 184 B Low
218 DNS sinkhole 5,635 181 Start Unknown
219 Cyber Resilience Act 5,613 181 C Low
220 Nintendo data leak 5,566 179 C Low
221 NTLM 5,563 179 C Mid
222 Electronic voting 5,555 179 C Unknown
223 Time-of-check to time-of-use 5,488 177 Start Low
224 Tiny Banker Trojan 5,483 176 C Low
225 Jonathan James 5,420 174 Start Low
226 Null character 5,351 172 Start Mid
227 Samsung Knox 5,341 172 Start Mid
228 Attribute-based access control 5,304 171 C Mid
229 Len Sassaman 5,248 169 C Low
230 Cyberwarfare by Russia 5,240 169 B High
231 ESET 5,239 169 Start Low
232 Dahua Technology 5,228 168 B Low
233 Personal identification number 5,196 167 C High
234 Return-oriented programming 5,125 165 C High
235 Object-capability model 5,109 164 Start Mid
236 Patch Tuesday 5,099 164 C Mid
237 Clickjacking 5,078 163 B Mid
238 Web of trust 5,077 163 C Low
239 Cult of the Dead Cow 5,074 163 C Mid
240 LastPass 5,062 163 Start Low
241 ClamAV 5,037 162 Start Unknown
242 SiegedSec 5,029 162 C Low
243 Threat model 5,003 161 Start Low
244 Fake news website 4,971 160 C Low
245 Collision avoidance system 4,946 159 C Mid
246 Business continuity planning 4,941 159 B Mid
247 Cozy Bear 4,889 157 C Mid
248 Darktrace 4,865 156 Start Low
249 Xbox Underground 4,863 156 C Low
250 Jay Chaudhry 4,842 156 Stub Low
251 Zero Days 4,839 156 Start Low
252 ActionScript 4,829 155 C Low
253 SpyEye 4,829 155 Stub Unknown
254 Chaos Computer Club 4,822 155 C Mid
255 Daniel J. Bernstein 4,818 155 C Mid
256 Ron Rivest 4,795 154 Start High
257 Brain (computer virus) 4,790 154 C Low
258 Obfuscation (software) 4,787 154 C Mid
259 CalyxOS 4,756 153 C Low
260 Iptables 4,739 152 Start Mid
261 Marcus Hutchins 4,681 151 B Mid
262 Chinese wall 4,670 150 C Low
263 Code injection 4,657 150 C High
264 AVG AntiVirus 4,577 147 Start Low
265 Content Security Policy 4,571 147 C High
266 Digital forensics 4,490 144 GA High
267 Jeremy Hammond 4,482 144 C Low
268 Replay attack 4,475 144 C High
269 Row hammer 4,471 144 GA Low
270 Shellshock (software bug) 4,470 144 C High
271 DarkMatter Group 4,453 143 C Low
272 2017 Ukraine ransomware attacks 4,439 143 C High
273 Cold boot attack 4,409 142 C Low
274 IDN homograph attack 4,408 142 C Mid
275 Sony BMG copy protection rootkit scandal 4,384 141 B Low
276 Bug bounty program 4,367 140 C High
277 AACS encryption key controversy 4,364 140 GA Low
278 List of cyberattacks 4,364 140 List High
279 Whitelist 4,323 139 Start Low
280 Bruce Schneier 4,320 139 Start High
281 Operation Aurora 4,308 138 C Mid
282 ISACA 4,298 138 Start Low
283 Microsoft Security Essentials 4,284 138 C Mid
284 Radia Perlman 4,263 137 C Mid
285 Internet leak 4,134 133 C High
286 Mirror site 4,133 133 Start Mid
287 Goatse Security 4,125 133 Start Low
288 Creeper and Reaper 4,121 132 Start Low
289 Voter-verified paper audit trail 4,108 132 C High
290 Technical support scam 4,013 129 GA Mid
291 The Cuckoo's Egg (book) 3,991 128 Start Low
292 Cyber kill chain 3,991 128 Stub Unknown
293 Intel Active Management Technology 3,978 128 C High
294 Bread Financial 3,967 127 Start Low
295 Albert Gonzalez 3,933 126 C Mid
296 Non-repudiation 3,917 126 Start Mid
297 Vendor 3,890 125 Start Low
298 Netfilter 3,888 125 C Mid
299 DarkSide (hacker group) 3,855 124 Start Low
300 Cloud computing security 3,806 122 Start Unknown
301 Endpoint detection and response 3,800 122 Start Low
302 Conficker 3,777 121 B Mid
303 Operation Olympic Games 3,772 121 Start Mid
304 Proofpoint, Inc. 3,734 120 Start Low
305 List of computer security companies 3,719 119 List Low
306 List of cybercriminals 3,692 119 List Mid
307 Port scanner 3,668 118 B High
308 Nulled 3,667 118 Start Unknown
309 Evaluation Assurance Level 3,630 117 Start Low
310 Code Red (computer worm) 3,625 116 Start Low
311 Memory safety 3,623 116 C Low
312 Certificate Transparency 3,600 116 C High
313 List of password managers 3,594 115 List Low
314 Dmitri Alperovitch 3,568 115 C Low
315 Network security 3,545 114 Start High
316 File inclusion vulnerability 3,540 114 Start Mid
317 Open banking 3,537 114 C Low
318 Melissa (computer virus) 3,524 113 Start Unknown
319 Electronic voting by country 3,511 113 C Unknown
320 Office of Personnel Management data breach 3,457 111 C High
321 2007 cyberattacks on Estonia 3,454 111 Start High
322 Dictionary attack 3,452 111 C High
323 COBIT 3,430 110 Start High
324 Security token 3,412 110 C High
325 Comparison of instant messaging protocols 3,379 109 List Low
326 Cyberwarfare and China 3,361 108 C High
327 Timing attack 3,339 107 C Mid
328 ATT&CK 3,331 107 Stub Low
329 Bell–LaPadula model 3,320 107 C Low
330 BeyondTrust 3,319 107 Stub Low
331 Evil maid attack 3,310 106 C Mid
332 PLA Unit 61398 3,308 106 Start Mid
333 Cellebrite UFED 3,307 106 C Low
334 DDoS attacks on Dyn 3,300 106 C Mid
335 Hector Monsegur 3,296 106 Start Low
336 Trishneet Arora 3,295 106 Start Low
337 Offensive Security 3,259 105 C Low
338 Common Criteria 3,257 105 Start Low
339 CryptoLocker 3,238 104 C Mid
340 Fork (blockchain) 3,236 104 Start Low
341 Climatic Research Unit email controversy 3,234 104 B Low
342 Physical security 3,231 104 C Top
343 Nessus (software) 3,218 103 Start Low
344 Cookie syncing 3,191 102 C Low
345 Mandatory access control 3,173 102 C High
346 Fail2ban 3,139 101 Start Mid
347 Kevin Poulsen 3,138 101 Start Mid
348 ISC2 3,119 100 Start Mid
349 DREAD (risk assessment model) 3,112 100 Start Low
350 2015 Ukraine power grid hack 3,099 99 C Mid
351 Russian interference in the 2020 United States elections 3,037 97 B Low
352 Hack Forums 3,032 97 C Low
353 Arbitrary code execution 3,006 96 C High
354 Offensive Security Certified Professional 2,987 96 Start Mid
355 L0pht 2,983 96 B Mid
356 Carbanak 2,983 96 Start Low
357 Contingency plan 2,981 96 Start High
358 Third-party cookies 2,954 95 C Low
359 NSAKEY 2,951 95 C High
360 Cain and Abel (software) 2,938 94 Start Low
361 Pegasus Project (investigation) 2,923 94 C Low
362 Candiru (spyware company) 2,913 93 Start Low
363 Chaos Communication Congress 2,912 93 Start Low
364 MAC spoofing 2,911 93 Start Unknown
365 Certified ethical hacker 2,887 93 Start Low
366 Chief information security officer 2,887 93 Start Mid
367 Nunes memo 2,864 92 B Low
368 Wardialing 2,862 92 Start Unknown
369 Comparison of computer viruses 2,860 92 List High
370 Hashcat 2,846 91 C Low
371 Voice phishing 2,833 91 Stub Mid
372 Diameter (protocol) 2,832 91 Start Low
373 British Library cyberattack 2,829 91 Start Low
374 Avira 2,825 91 C Low
375 Blaster (computer worm) 2,819 90 Start Low
376 Wickr 2,816 90 C Mid
377 Kill chain (military) 2,796 90 Start Unknown
378 BlackCat (cyber gang) 2,791 90 Start Low
379 Privacy law 2,781 89 Start High
380 Briar (software) 2,759 89 Start Low
381 The Crash (2017 film) 2,744 88 Start Low
382 Evil twin (wireless networks) 2,720 87 Start Mid
383 CIH (computer virus) 2,699 87 Start Low
384 360 Total Security 2,694 86 Start Low
385 Mitigation 2,684 86 Start Mid
386 Federated identity 2,675 86 Start High
387 SANS Institute 2,672 86 Start Mid
388 OneTrust 2,663 85 C Low
389 Brian Krebs 2,662 85 Start Low
390 Cybersecurity Maturity Model Certification 2,658 85 C Low
391 SQL Slammer 2,655 85 Start Low
392 Authentication, authorization, and accounting 2,655 85 Start Mid
393 Dan Kaminsky 2,653 85 B Mid
394 Trust on first use 2,634 84 Start Low
395 Flame (malware) 2,633 84 C Mid
396 List of spyware programs 2,630 84 Start Low
397 Pseudonymization 2,627 84 Start Unknown
398 Snort (software) 2,614 84 Start Mid
399 Buffer overflow protection 2,611 84 C Mid
400 Internet security 2,608 84 C High
401 Next-generation firewall 2,606 84 Start Low
402 CYREN 2,575 83 B Mid
403 Cyber threat intelligence 2,574 83 Start Low
404 Forcepoint 2,562 82 Start Unknown
405 High Orbit Ion Cannon 2,561 82 C Mid
406 Van Eck phreaking 2,552 82 C Low
407 Shellcode 2,550 82 B High
408 Capability-based security 2,540 81 Start High
409 Traffic Light Protocol 2,539 81 Start Unknown
410 BleachBit 2,538 81 C Low
411 Jacob Appelbaum 2,535 81 B Low
412 Bureau 121 2,533 81 C Low
413 Whiz Kids (TV series) 2,501 80 C Low
414 The Artifice Girl 2,500 80 Start Low
415 EPrivacy Directive 2,495 80 C Low
416 Email hacking 2,482 80 Start Mid
417 Fake news websites in the United States 2,477 79 B High
418 New generation warfare 2,469 79 Start Low
419 Tanium 2,468 79 Start Low
420 FIPS 140-3 2,463 79 C Low
421 Acceptable use policy 2,460 79 Start Mid
422 Keeper (password manager) 2,451 79 Start Low
423 Application security 2,446 78 Start High
424 Dr.Web 2,433 78 Start Low
425 Cyber-security regulation 2,426 78 C High
426 FIPS 140 2,414 77 Start Low
427 Computer and network surveillance 2,413 77 C Top
428 Dangling pointer 2,413 77 C Mid
429 Information security standards 2,408 77 C Top
430 Google Safe Browsing 2,400 77 Start Unknown
431 Security.txt 2,398 77 Start Low
432 Entrust 2,389 77 Start Unknown
433 Confused deputy problem 2,385 76 Start High
434 Conti (ransomware) 2,379 76 Start Low
435 Data loss prevention software 2,369 76 Start Mid
436 Darik's Boot and Nuke 2,345 75 Start Unknown
437 Endpoint security 2,338 75 Stub Unknown
438 Anonymous Sudan 2,333 75 C High
439 ISO/IEC 27002 2,328 75 Stub Low
440 Data security 2,325 75 Start High
441 Security-focused operating system 2,323 74 List Mid
442 HackThisSite 2,306 74 C Low
443 Cyber espionage 2,282 73 Start High
444 Trusted timestamping 2,262 72 Start Unknown
445 Shamoon 2,250 72 Start Mid
446 Scareware 2,246 72 Start Mid
447 Anonymous and the Russian invasion of Ukraine 2,231 71 C Low
448 Secure by design 2,223 71 Start High
449 Drive-by download 2,221 71 Start High
450 Coordinated vulnerability disclosure 2,217 71 Stub High
451 Peiter Zatko 2,210 71 B Mid
452 Mark of the Web 2,204 71 Start Low
453 IntelBroker 2,203 71 B Low
454 Hacker ethic 2,200 70 C High
455 Communications security 2,186 70 Start Mid
456 RSA Conference 2,185 70 Start Mid
457 Multi-factor authentication fatigue attack 2,180 70 Redirect Low
458 Foreign interference in the 2024 United States elections 2,172 70 C Low
459 Attack surface 2,167 69 Stub Mid
460 Suricata (software) 2,164 69 Start Low
461 Arctic Wolf Networks 2,164 69 Stub Unknown
462 Dynamic application security testing 2,161 69 Start Low
463 Zeek 2,130 68 Stub Unknown
464 Dark0de 2,130 68 Start Mid
465 HackingTeam 2,129 68 B Mid
466 Reception and criticism of WhatsApp security and privacy features 2,123 68 C Low
467 Computer forensics 2,121 68 C High
468 Anna Kournikova (computer virus) 2,109 68 C Mid
469 Ankit Fadia 2,108 68 Start Low
470 Troy Hunt 2,108 68 Start Low
471 Java KeyStore 2,102 67 Stub Low
472 Opportunistic TLS 2,081 67 Start Mid
473 Virtual machine escape 2,081 67 Start Low
474 System Management Mode 2,067 66 Start High
475 Symantec Endpoint Protection 2,059 66 GA Low
476 List of cyber warfare forces 2,056 66 Start Low
477 BREACH 2,053 66 Start High
478 List of computer security certifications 2,053 66 List Mid
479 Cyberwarfare and the United States 2,046 66 C High
480 Session fixation 2,045 65 Start High
481 Roman Seleznev 2,044 65 Start Low
482 Sub7 2,039 65 Start Mid
483 Chain of trust 2,034 65 Start Mid
484 Infostealer 2,030 65 B Low
485 Operation Payback 2,027 65 B Low
486 United States Army Cyber Command 2,019 65 Stub Low
487 Cryptojacking 1,992 64 Start Low
488 Indian WhatsApp lynchings 1,982 63 List High
489 CRIME 1,972 63 Start High
490 Shoulder surfing (computer security) 1,966 63 C Low
491 Guccifer 2.0 1,966 63 B Low
492 Computer emergency response team 1,956 63 Start High
493 Regulation of self-driving cars 1,956 63 B Mid
494 Noname057(16) 1,955 63 C Low
495 BusKill 1,954 63 Start Low
496 Security operations center 1,947 62 Start Low
497 Ping of death 1,940 62 Start Low
498 Gameover ZeuS 1,933 62 GA Mid
499 Nikto (vulnerability scanner) 1,924 62 Stub Low
500 Market for zero-day exploits 1,924 62 C High