Jump to content

Wikipedia:WikiProject Computer security/Popular pages

From Wikipedia, the free encyclopedia

This is a list of pages in the scope of Wikipedia:WikiProject Computer Security along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

List

[edit]

Period: 2025-06-01 to 2025-06-30

Total views: 4,758,561

Updated: 07:59, 6 July 2025 (UTC)

Rank Page title Views Daily average Assessment Importance
1 HTTP cookie 214,413 7,147 C High
2 Anonymous (hacker group) 81,306 2,710 GA Mid
3 Pegasus (spyware) 71,248 2,374 B Low
4 Have I Been Pwned? 65,696 2,189 Start High
5 TamilRockers 64,420 2,147 Start Low
6 Blockchain 62,461 2,082 B Top
7 Phishing 57,850 1,928 B High
8 Proxy server 50,637 1,687 B High
9 WarGames 39,684 1,322 C Low
10 Cryptography 37,231 1,241 C Top
11 Secure Shell 37,162 1,238 C High
12 List of Tor onion services 37,056 1,235 List Low
13 Cloudflare 35,909 1,196 C Low
14 Virtual private network 33,973 1,132 C Mid
15 Reality Winner 32,356 1,078 B Mid
16 DJI 28,714 957 C Low
17 Self-driving car 27,258 908 B Mid
18 Phone hacking 27,076 902 Start Mid
19 Google hacking 26,770 892 Start Low
20 Malware 26,226 874 C Top
21 Multi-factor authentication 26,078 869 C High
22 Russian interference in the 2016 United States elections 25,702 856 B High
23 Facebook–Cambridge Analytica data scandal 24,602 820 C High
24 Zero-day vulnerability 24,404 813 C High
25 Kevin Mitnick 24,081 802 C High
26 Man-in-the-middle attack 23,164 772 C Mid
27 Swatting 22,790 759 C Mid
28 Lolita City 21,980 732 Start Low
29 SQL injection 20,991 699 Start High
30 CrowdStrike 20,832 694 B Mid
31 Hackers (film) 20,249 674 C Low
32 ILOVEYOU 19,532 651 C Mid
33 Cybercrime 19,358 645 C High
34 Palo Alto Networks 19,200 640 C High
35 Reverse engineering 18,727 624 C High
36 Lazarus Group 18,436 614 C Mid
37 Pretty Good Privacy 18,250 608 B High
38 Privacy 18,190 606 C High
39 Vault 7 17,997 599 C Unknown
40 Adobe Flash 17,752 591 C Low
41 Operation Olympic Games 17,728 590 Start Mid
42 BIOS 17,683 589 B Mid
43 Software testing 17,578 585 C Low
44 Aladdin (BlackRock) 17,545 584 Stub Low
45 Cross-site request forgery 17,333 577 C High
46 Cryptographic hash function 17,310 577 C High
47 Sneakers (1992 film) 17,207 573 B Low
48 Kali Linux 16,239 541 Start Mid
49 Timeline of events associated with Anonymous 15,476 515 C Low
50 Information security 15,264 508 B Top
51 Social engineering (security) 15,150 505 C High
52 Cross-site scripting 15,037 501 B High
53 Ransomware 14,973 499 GA High
54 Password manager 14,816 493 C Mid
55 Kerberos (protocol) 14,802 493 C High
56 VirusTotal 14,560 485 Start High
57 Certificate authority 14,163 472 C High
58 List of the most common passwords 13,888 462 List Unknown
59 Trusted Platform Module 13,616 453 C High
60 Security hacker 13,114 437 C Top
61 NSO Group 13,074 435 B Mid
62 Human–computer interaction 12,915 430 C Low
63 Time-based one-time password 12,848 428 C High
64 Startpage 12,830 427 C Low
65 OAuth 12,813 427 C Mid
66 Mail and wire fraud 12,776 425 Start Mid
67 Single sign-on 12,696 423 C High
68 ReCAPTCHA 12,395 413 B Mid
69 List of data breaches 12,286 409 List High
70 Keychain (software) 12,223 407 Start Low
71 Ashley Madison data breach 12,213 407 Start Mid
72 Okta, Inc. 12,123 404 Start Mid
73 Race condition 12,075 402 C Mid
74 Zip bomb 12,018 400 Start Low
75 Public key infrastructure 12,017 400 C High
76 Automatic Certificate Management Environment 11,919 397 Start Low
77 News International phone hacking scandal 11,857 395 C Mid
78 Phreaking 11,830 394 C Mid
79 Salt Typhoon 11,819 393 C Unknown
80 EICAR test file 11,672 389 C Low
81 Tails (operating system) 11,547 384 Start Mid
82 Data breach 11,489 382 GA Mid
83 Playpen (website) 11,293 376 Start Low
84 Trojan horse (computing) 11,269 375 C High
85 Spyware 11,240 374 B High
86 White hat (computer security) 11,181 372 Start Low
87 STRIDE model 11,094 369 Start Low
88 Authentication 11,072 369 C High
89 Cyberwarfare 11,025 367 C High
90 Zscaler 10,826 360 Start Low
91 2014 Sony Pictures hack 10,695 356 C High
92 Brute-force attack 10,650 355 C High
93 Honeypot (computing) 10,498 349 Start High
94 Payment Card Industry Data Security Standard 10,428 347 Start Low
95 Electronic voting in India 10,367 345 GA High
96 Risk 10,343 344 C Top
97 Return-oriented programming 10,304 343 C High
98 Wiz, Inc. 10,257 341 Start Low
99 Zero trust architecture 10,109 336 C High
100 End-to-end encryption 10,080 336 C Mid
101 Hardware security module 9,946 331 Start Mid
102 Synopsys 9,875 329 B Mid
103 Sony BMG copy protection rootkit scandal 9,841 328 B Low
104 Advanced persistent threat 9,831 327 B High
105 Role-based access control 9,754 325 C Mid
106 Integer overflow 9,691 323 Start Unknown
107 Bitwarden 9,596 319 C Mid
108 VeraCrypt 9,501 316 C High
109 Same-origin policy 9,489 316 Start High
110 Fortinet 9,468 315 C Mid
111 OpenBSD 9,451 315 B High
112 SIM swap scam 9,361 312 Start Mid
113 Hacktivism 9,207 306 C High
114 YubiKey 9,154 305 Start Low
115 Protection ring 8,916 297 B High
116 Maia arson crimew 8,891 296 GA Low
117 Children's Online Privacy Protection Act 8,763 292 Start Low
118 Cyberspace 8,747 291 C High
119 Electronic Frontier Foundation 8,738 291 C High
120 Morris worm 8,726 290 C High
121 DMZ (computing) 8,656 288 Start High
122 Internet leak 8,496 283 C High
123 Gary McKinnon 8,350 278 C High
124 Script kiddie 8,337 277 Start Mid
125 Kill switch 8,279 275 C Low
126 Keystroke logging 8,277 275 C Low
127 United States Cyber Command 8,208 273 B High
128 Intel Management Engine 8,160 272 C High
129 Penetration test 8,109 270 C Mid
130 Microsoft Defender Antivirus 8,048 268 C Mid
131 Botnet 7,983 266 C High
132 Common Vulnerabilities and Exposures 7,959 265 C Top
133 OpenID 7,943 264 B Low
134 Buffer overflow 7,883 262 B High
135 Federal Information Processing Standards 7,801 260 Start Low
136 Operation Trojan Shield 7,729 257 C Low
137 Lightning Network 7,613 253 Start Low
138 KeePass 7,447 248 C Mid
139 Software cracking 7,424 247 Start Mid
140 Security-Enhanced Linux 7,379 245 C High
141 Web cache 7,294 243 Start Low
142 ChaCha20-Poly1305 7,176 239 C Low
143 Petya (malware family) 7,167 238 C High
144 Malwarebytes (software) 7,165 238 C Mid
145 Access control 7,026 234 C High
146 Red team 7,022 234 GA Low
147 Dynamic-link library 7,019 233 C Unknown
148 Jay Chaudhry 6,998 233 Stub Low
149 Identity and access management 6,944 231 C High
150 ID.me 6,942 231 Start Low
151 Moxie Marlinspike 6,929 230 B Low
152 Black hat (computer security) 6,886 229 C Mid
153 Whitelist 6,883 229 Start Low
154 Right to privacy 6,849 228 C High
155 Sudo 6,846 228 B Low
156 Darktrace 6,708 223 Start Low
157 Electronic voting 6,690 223 C Unknown
158 Bangladesh Bank robbery 6,627 220 C Low
159 CyberArk 6,562 218 C Low
160 Email spoofing 6,558 218 Start Mid
161 Nmap 6,542 218 C Mid
162 RADIUS 6,539 217 C Mid
163 Backdoor (computing) 6,524 217 C Mid
164 1Password 6,509 216 C Low
165 CCleaner 6,504 216 C High
166 LulzSec 6,491 216 B High
167 Adrian Lamo 6,445 214 C High
168 Scammer Payback 6,431 214 Start Mid
169 List of warez groups 6,312 210 Start Mid
170 Wi-Fi Protected Setup 6,253 208 C Mid
171 Podesta emails 6,239 207 C Low
172 Timeline of computer viruses and worms 6,195 206 Start High
173 Clickjacking 6,147 204 B Mid
174 The Tor Project 6,124 204 C Top
175 Tiny Banker Trojan 6,080 202 C Low
176 Climatic Research Unit email controversy 6,039 201 B Low
177 OWASP 6,032 201 C Low
178 Access-control list 6,015 200 Start High
179 Len Sassaman 5,969 198 C Low
180 Security through obscurity 5,959 198 C Mid
181 Low Orbit Ion Cannon 5,934 197 Start Low
182 Fancy Bear 5,907 196 C High
183 Weev 5,891 196 C Low
184 SentinelOne 5,861 195 Start Unknown
185 File-system permissions 5,845 194 C High
186 The Cuckoo's Egg (book) 5,817 193 Start Low
187 Log4Shell 5,783 192 C Mid
188 List of hacker groups 5,704 190 Start Mid
189 Certified Information Systems Security Professional 5,693 189 C Mid
190 Address space layout randomization 5,683 189 C High
191 Off-by-one error 5,671 189 Start Unknown
192 Microsoft Intune 5,651 188 Start Mid
193 List of security hacking incidents 5,634 187 List High
194 Hybrid warfare 5,631 187 C High
195 Common Vulnerability Scoring System 5,553 185 C High
196 Null character 5,525 184 Start Mid
197 Credential stuffing 5,503 183 C High
198 Avast Antivirus 5,492 183 Start Mid
199 Zero Days 5,459 181 Start Low
200 Cyber Resilience Act 5,342 178 C Low
201 Infostealer 5,338 177 B Low
202 Avast 5,270 175 B Mid
203 Trellix 5,262 175 B Mid
204 BlackCat (cyber gang) 5,259 175 Start Low
205 Marcus Hutchins 5,253 175 B Mid
206 Jim Browning (YouTuber) 5,228 174 Start Low
207 IDN homograph attack 5,207 173 C Mid
208 Personal identification number 5,181 172 C High
209 NIST Cybersecurity Framework 5,174 172 Start Top
210 Sophos 5,171 172 Start Mid
211 IntelBroker 5,158 171 B Low
212 Replay attack 5,146 171 C High
213 Fork (blockchain) 5,123 170 Start Low
214 Searx 5,070 169 C Unknown
215 Row hammer 4,964 165 GA Low
216 Metasploit 4,943 164 C Mid
217 Paywall 4,926 164 C Mid
218 Brain (computer virus) 4,904 163 C Low
219 2016 Democratic National Committee email leak 4,833 161 C Mid
220 Cyberwarfare and Iran 4,811 160 Start Mid
221 Code injection 4,804 160 C High
222 Lattice-based cryptography 4,763 158 Start Low
223 DNS sinkhole 4,761 158 Start Unknown
224 Cold boot attack 4,758 158 C Low
225 KeePassXC 4,755 158 Start Low
226 Mutual authentication 4,664 155 Stub Low
227 Attribute-based access control 4,659 155 C Mid
228 Patch Tuesday 4,652 155 C Mid
229 NTLM 4,645 154 C Mid
230 Object-capability model 4,625 154 Start Mid
231 Pegasus Project (investigation) 4,624 154 C Low
232 Nintendo data leak 4,615 153 C Low
233 Web of trust 4,611 153 C Low
234 2017 Ukraine ransomware attacks 4,597 153 C High
235 Norton AntiVirus 4,550 151 C Mid
236 Fake news website 4,518 150 C Low
237 John the Ripper 4,470 149 Start Low
238 Collision avoidance system 4,442 148 C Mid
239 Xbox Underground 4,437 147 C Low
240 Let's Encrypt 4,431 147 B Low
241 Chinese wall 4,415 147 C Low
242 Chaos Computer Club 4,411 147 C Mid
243 Fail2ban 4,410 147 Start Mid
244 Burp Suite 4,379 145 Start Low
245 Billion laughs attack 4,373 145 Start Low
246 Business continuity planning 4,361 145 B Mid
247 Tiger team 4,353 145 Start Unknown
248 ClamAV 4,341 144 Start Unknown
249 Dahua Technology 4,338 144 B Low
250 CalyxOS 4,332 144 C Low
251 LockBit 4,271 142 C High
252 Weird machine 4,253 141 Stub Low
253 Mitigation 4,235 141 Start Mid
254 Internet security 4,187 139 C High
255 Samsung Knox 4,170 139 Start Mid
256 Flame (malware) 4,157 138 C Mid
257 SpyEye 4,145 138 Stub Unknown
258 SAML 2.0 4,137 137 C Low
259 Mydoom 4,121 137 Start Mid
260 ActionScript 4,117 137 C Low
261 Ungoogled-chromium 4,093 136 Start Low
262 Conficker 4,089 136 B Mid
263 Threat model 4,085 136 Start Low
264 Cozy Bear 4,085 136 C Mid
265 Mirror site 4,077 135 C Mid
266 Digital forensics 4,024 134 GA High
267 Security token 4,008 133 C High
268 Lapsus$ 4,004 133 C Low
269 2011 PlayStation Network outage 3,994 133 C Mid
270 Time-of-check to time-of-use 3,978 132 Start Low
271 Obfuscation (software) 3,975 132 C Mid
272 ESET 3,946 131 Start Low
273 Computer and network surveillance 3,899 129 C Top
274 Bruce Schneier 3,860 128 Start High
275 Kill chain (military) 3,851 128 Start Unknown
276 Timing attack 3,798 126 C Mid
277 Evaluation Assurance Level 3,795 126 Start Low
278 Bug bounty program 3,788 126 C High
279 Creeper and Reaper 3,785 126 Start Low
280 NSAKEY 3,763 125 C High
281 Ron Rivest 3,761 125 Start High
282 ISACA 3,760 125 Start Low
283 Hector Monsegur 3,752 125 Start Low
284 Data security 3,750 125 Start High
285 Jonathan James 3,742 124 Start Low
286 Proofpoint, Inc. 3,736 124 Start Low
287 Intel Active Management Technology 3,731 124 C High
288 Cyberwarfare by Russia 3,728 124 B High
289 Port scanner 3,709 123 B High
290 The Artifice Girl 3,692 123 Start Low
291 Albert Gonzalez 3,687 122 C Mid
292 Brian Krebs 3,675 122 Start Low
293 Technical support scam 3,653 121 GA Mid
294 Memory safety 3,607 120 C Low
295 Wickr 3,578 119 C Mid
296 Voice phishing 3,563 118 Stub Mid
297 Radia Perlman 3,552 118 C Mid
298 Iptables 3,550 118 C Mid
299 List of cybercriminals 3,529 117 List Mid
300 Cult of the Dead Cow 3,495 116 C Mid
301 Confused deputy problem 3,483 116 Start High
302 File inclusion vulnerability 3,477 115 Start Mid
303 Shellshock (software bug) 3,469 115 C High
304 Dan Kaminsky 3,467 115 B Mid
305 Vendor 3,429 114 Start Low
306 Bread Financial 3,419 113 Start Low
307 Content Security Policy 3,415 113 C High
308 LastPass 3,398 113 Start Low
309 Physical security 3,376 112 C Top
310 Evil maid attack 3,345 111 C Mid
311 Shamoon 3,342 111 Start Mid
312 Root certificate 3,335 111 Start Mid
313 Dictionary attack 3,297 109 C High
314 Cyber kill chain 3,293 109 Start Mid
315 Blacklist (computing) 3,290 109 Start Mid
316 Buffer overflow protection 3,256 108 C Mid
317 Netfilter 3,253 108 C Mid
318 Aubrey Cottle 3,248 108 C Mid
319 ISC2 3,240 108 Start Mid
320 Mandatory access control 3,239 107 C High
321 Arbitrary code execution 3,232 107 C High
322 Contingency plan 3,205 106 Start High
323 Daniel J. Bernstein 3,187 106 C Mid
324 BGP hijacking 3,184 106 Stub Mid
325 Bell–LaPadula model 3,178 105 C Low
326 OneTrust 3,177 105 C Low
327 Computer forensics 3,167 105 C High
328 Voter-verified paper audit trail 3,160 105 C High
329 Privacy law 3,160 105 Start High
330 Hacker ethic 3,151 105 C High
331 Jeremy Hammond 3,148 104 C Low
332 DarkMatter Group 3,138 104 C Low
333 Yahoo data breaches 3,137 104 GA Mid
334 Email hacking 3,132 104 Start Mid
335 23andMe data leak 3,130 104 Start Low
336 Dmitri Alperovitch 3,108 103 C Low
337 Nulled 3,108 103 Start Unknown
338 Troy Hunt 3,095 103 Start Low
339 Wardialing 3,094 103 Start Unknown
340 List of cyberattacks 3,087 102 List High
341 Russian interference in the 2024 United States elections 3,064 102 C Low
342 Mark of the Web 3,021 100 Start Low
343 Network security 3,000 100 Start High
344 AVG AntiVirus 2,994 99 Start Low
345 Certificate Transparency 2,980 99 C High
346 Third-party cookies 2,975 99 C Low
347 Electronic voting by country 2,961 98 C Unknown
348 Slopsquatting 2,956 98 C Low
349 MAC spoofing 2,952 98 Start Unknown
350 Code Red (computer worm) 2,913 97 Start Low
351 Endpoint detection and response 2,912 97 Start Low
352 Forcepoint 2,905 96 Start Unknown
353 Operation Aurora 2,900 96 C Mid
354 Open banking 2,892 96 C Low
355 Drive-by download 2,876 95 Start High
356 Dangling pointer 2,874 95 C Mid
357 List of password managers 2,844 94 List Low
358 The Crash (2017 film) 2,829 94 Start Low
359 Duqu 2,812 93 C Mid
360 Bluesnarfing 2,805 93 Start Low
361 Certified ethical hacker 2,800 93 Start Low
362 Shellcode 2,777 92 B High
363 Hacker Manifesto 2,768 92 Start Mid
364 Team Xecuter 2,765 92 Start Low
365 Offensive Security 2,764 92 C Low
366 Common Criteria 2,743 91 Start Low
367 Non-repudiation 2,720 90 Start Mid
368 Four Horsemen of the Infocalypse 2,719 90 Start Low
369 Nunes memo 2,713 90 B Low
370 Cloud computing security 2,702 90 Start Unknown
371 Dr.Web 2,701 90 Start Low
372 Capability-based security 2,693 89 Start High
373 Smurf attack 2,691 89 C Mid
374 Secure by design 2,688 89 Start High
375 Akira (ransomware) 2,676 89 Stub Low
376 Kevin Poulsen 2,666 88 Start Mid
377 CIH (computer virus) 2,663 88 Start Low
378 Briar (software) 2,645 88 Start Low
379 Opportunistic TLS 2,640 88 Start Mid
380 Blaster (computer worm) 2,629 87 Start Low
381 Cain and Abel (software) 2,628 87 Start Low
382 Van Eck phreaking 2,617 87 C Low
383 ATT&CK 2,575 85 Stub Low
384 Scareware 2,561 85 Start Mid
385 AACS encryption key controversy 2,556 85 GA Low
386 Offensive Security Certified Professional 2,545 84 Start Mid
387 COBIT 2,523 84 Start High
388 Data retention 2,501 83 C Low
389 SwiftOnSecurity 2,497 83 Stub Low
390 DDoS attacks on Dyn 2,489 82 C Mid
391 BeyondTrust 2,486 82 Stub Low
392 2600: The Hacker Quarterly 2,484 82 Start Mid
393 Jacob Appelbaum 2,469 82 B Low
394 Hack Forums 2,465 82 C Low
395 Melissa (computer virus) 2,461 82 Start Unknown
396 PLA Unit 61398 2,453 81 Start Mid
397 Nessus (software) 2,449 81 Start Low
398 Cyberwarfare and China 2,408 80 C High
399 Ping of death 2,388 79 Start Low
400 Cyberweapon 2,382 79 Start High
401 Data loss prevention software 2,378 79 Start Mid
402 Avira 2,363 78 C Low
403 Pseudonymization 2,360 78 Start Unknown
404 Office of Personnel Management data breach 2,358 78 C High
405 Security-focused operating system 2,354 78 List Mid
406 Click fraud 2,352 78 C Low
407 DREAD (risk assessment model) 2,328 77 Start Low
408 Markus Hess 2,322 77 Start Low
409 BREACH 2,317 77 Start High
410 GhostNet 2,315 77 C Mid
411 2015 Ukraine power grid hack 2,308 76 C Mid
412 Shoulder surfing (computer security) 2,303 76 C Low
413 Mark Abene 2,290 76 Start Mid
414 Chief information security officer 2,289 76 Start Mid
415 DarkSide (hacker group) 2,289 76 Start Low
416 Mermaids (charity) 2,279 75 Start Low
417 Chaos Communication Congress 2,262 75 Start Low
418 Dark0de 2,234 74 Start Mid
419 Keeper (password manager) 2,230 74 Start Low
420 Indian WhatsApp lynchings 2,229 74 List High
421 Tanium 2,201 73 Start Low
422 FIPS 140 2,200 73 Start Low
423 Application security 2,192 73 Start High
424 Threat actor 2,192 73 C Mid
425 SANS Institute 2,191 73 Start Mid
426 New generation warfare 2,184 72 Start Low
427 Comparison of computer viruses 2,178 72 List High
428 Whiz Kids (TV series) 2,163 72 C Low
429 CRIME 2,154 71 Start High
430 Darik's Boot and Nuke 2,142 71 Start Unknown
431 Federated identity 2,134 71 Start High
432 ISO/IEC 27002 2,124 70 Stub Low
433 Attack surface 2,119 70 Stub Mid
434 Acceptable use policy 2,115 70 Start Mid
435 Mikko Hyppönen 2,107 70 C Low
436 Supersingular isogeny key exchange 2,106 70 Start Low
437 Goatse Security 2,105 70 Start Low
438 Fake news websites in the United States 2,099 69 B High
439 Information security standards 2,093 69 C Top
440 2007 cyberattacks on Estonia 2,076 69 Start High
441 Comparison of instant messaging protocols 2,072 69 List Low
442 CYREN 2,068 68 B Mid
443 Fufufafa 2,068 68 C Unknown
444 Entrust 2,065 68 Start Unknown
445 SiegedSec 2,062 68 C Low
446 List of spyware programs 2,061 68 Start Low
447 Virus hoax 2,056 68 C Low
448 Cellebrite UFED 2,048 68 C Low
449 Snort (software) 2,047 68 Start Mid
450 Legion of Doom (hacker group) 2,036 67 Start Low
451 EPrivacy Directive 2,033 67 C Low
452 Authentication, authorization, and accounting 2,019 67 Start Mid
453 Microsoft Security Essentials 2,013 67 C Mid
454 Control-flow integrity 2,011 67 C High
455 Bureau 121 2,010 67 C Low
456 Rogue security software 2,009 66 C High
457 Browser hijacking 2,007 66 C High
458 Communications security 2,001 66 Start Mid
459 Mobile security 1,995 66 C Top
460 Gutmann method 1,990 66 C Mid
461 Hashcat 1,982 66 C Low
462 FIPS 140-3 1,981 66 C Low
463 Hackers: Heroes of the Computer Revolution 1,975 65 Start Low
464 Webroot 1,952 65 Start Low
465 Cyber-security regulation 1,947 64 C High
466 Carbanak 1,946 64 Start Low
467 Computer emergency response team 1,945 64 Start High
468 Secure cryptoprocessor 1,941 64 C Mid
469 Coordinated vulnerability disclosure 1,941 64 Stub High
470 Self-destruct 1,937 64 C Low
471 Diameter (protocol) 1,928 64 Start Low
472 Email privacy 1,921 64 C Mid
473 Spy pixel 1,920 64 C Low
474 List of compact discs sold with Extended Copy Protection 1,919 63 List Low
475 Cybersecurity Maturity Model Certification 1,915 63 C Low
476 CryptoLocker 1,909 63 C Mid
477 SQL Slammer 1,898 63 Start Low
478 List of cyber warfare forces 1,890 63 Start Low
479 Dropper (malware) 1,889 62 Stub Mid
480 Next-generation firewall 1,889 62 Start Low
481 Security.txt 1,888 62 Start Low
482 Market for zero-day exploits 1,885 62 C High
483 Trishneet Arora 1,878 62 Start Low
484 HackThisSite 1,855 61 C Low
485 Dynamic application security testing 1,853 61 Start Low
486 Google Safe Browsing 1,843 61 Start Unknown
487 Encrypting File System 1,841 61 B Mid
488 List of computer security certifications 1,839 61 List Mid
489 Ankit Fadia 1,811 60 Start Low
490 Interdiction 1,809 60 Start Low
491 360 Total Security 1,806 60 Start Low
492 Trust on first use 1,806 60 Start Low
493 Roman Seleznev 1,804 60 Start Low
494 Secure cookie 1,800 60 Start High
495 Access token 1,799 59 Start Mid
496 Trusted timestamping 1,799 59 Start Unknown
497 BusKill 1,795 59 Start Low
498 Key server (cryptographic) 1,787 59 Start Mid
499 Reception and criticism of WhatsApp security and privacy features 1,786 59 C Low
500 Chain of trust 1,781 59 Start Mid