Wikipedia:WikiProject Computer Security/Popular pages

From Wikipedia, the free encyclopedia

This is a list of pages in the scope of Wikipedia:WikiProject Computer Security along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

List[edit]

Period: 2024-03-01 to 2024-03-31

Total views: 6,485,608

Updated: 14:05, 5 April 2024 (UTC)

Rank Page title Views Daily average Assessment Importance
1 HTTP cookie 320,850 10,350 C High
2 TamilRockers 142,678 4,602 Start Low
3 Reality Winner 131,335 4,236 B Mid
4 Phishing 120,564 3,889 B High
5 Blockchain 87,468 2,821 B Top
6 Virtual private network 82,087 2,647 C Mid
7 Anonymous (hacker group) 78,424 2,529 GA Mid
8 Proxy server 71,252 2,298 C High
9 Pegasus (spyware) 70,617 2,277 B Low
10 Zero trust security model 66,202 2,135 C High
11 ILOVEYOU 55,337 1,785 C Mid
12 List of Tor onion services 54,411 1,755 List Low
13 Electronic voting in India 54,203 1,748 B High
14 Cloudflare 51,577 1,663 C Low
15 Privacy 48,403 1,561 C High
16 Secure Shell 48,305 1,558 C Low
17 Facebook malware 45,939 1,481 Start Mid
18 WarGames 43,484 1,402 C Low
19 End-to-end encryption 42,444 1,369 C Mid
20 Kevin Mitnick 39,031 1,259 C High
21 Russian interference in the 2016 United States elections 38,005 1,225 B High
22 Facebook–Cambridge Analytica data scandal 37,438 1,207 C High
23 Lolita City 36,522 1,178 Start Low
24 Cybercrime 36,177 1,167 C High
25 McAfee 35,172 1,134 C High
26 Self-driving car 32,713 1,055 B Mid
27 Man-in-the-middle attack 32,388 1,044 C Mid
28 Kali Linux 31,518 1,016 Start Mid
29 Google hacking 31,347 1,011 Start Low
30 Software testing 30,695 990 C Low
31 BIOS 30,139 972 B Mid
32 Malware 29,800 961 C Top
33 Multi-factor authentication 29,724 958 C High
34 Cryptographic hash function 28,811 929 C High
35 Hackers (film) 28,118 907 C Low
36 Zero-day (computing) 27,356 882 C High
37 DJI 27,286 880 C Low
38 CrowdStrike 27,255 879 Start Unknown
39 Swatting 25,891 835 C Mid
40 Ashley Madison 25,645 827 C Low
41 Mail and wire fraud 25,565 824 Start Mid
42 Palo Alto Networks 25,529 823 C High
43 Pretty Good Privacy 24,883 802 B High
44 Ransomware 24,790 799 GA High
45 Adobe Flash 24,080 776 C Low
46 BlackCat (cyber gang) 23,267 750 Start Low
47 Playpen (website) 22,931 739 Start Low
48 ISO/IEC 27001 22,758 734 Start High
49 Certificate authority 22,699 732 C High
50 Ross J. Anderson 22,332 720 C Low
51 SQL injection 22,233 717 Start High
52 Trojan horse (computing) 22,135 714 C High
53 OAuth 21,978 708 C Mid
54 Trusted Platform Module 21,712 700 C High
55 Zip bomb 21,590 696 Start Low
56 VirusTotal 21,410 690 Start High
57 Cross-site request forgery 21,390 690 C High
58 Information security 20,674 666 B Top
59 Social engineering (security) 20,616 665 C High
60 Cross-site scripting 20,476 660 B High
61 Kerberos (protocol) 19,466 627 C High
62 Public key infrastructure 19,327 623 Start High
63 White hat (computer security) 19,287 622 Start Low
64 Reverse engineering 19,235 620 C High
65 Intel Management Engine 19,032 613 C High
66 Lazarus Group 18,938 610 C Mid
67 Aladdin (BlackRock) 18,842 607 Stub Low
68 Human–computer interaction 18,661 601 C Low
69 Security hacker 18,150 585 C Top
70 Kids Online Safety Act 17,919 578 Start Low
71 Time-based one-time password 17,818 574 C High
72 Vault 7 17,704 571 C Unknown
73 Electronic voting by country 17,638 568 C Unknown
74 Authentication 17,503 564 C High
75 Race condition 17,302 558 C Mid
76 List of data breaches 16,518 532 List High
77 List of the most common passwords 16,444 530 List Unknown
78 DMZ (computing) 16,282 525 Start High
79 STRIDE (security) 16,258 524 Start Low
80 Kaspersky Lab 16,168 521 B Mid
81 2014 Sony Pictures hack 16,166 521 C High
82 SIM swap scam 15,707 506 Start Mid
83 NSO Group 15,270 492 B Mid
84 Brute-force attack 15,242 491 C High
85 Jennifer Arcuri 15,116 487 C Low
86 Fortinet 15,021 484 GA Mid
87 Common Vulnerabilities and Exposures 14,812 477 C Top
88 Startpage.com 14,790 477 C Low
89 Payment Card Industry Data Security Standard 14,766 476 Start Low
90 Public key certificate 14,702 474 C High
91 Honeypot (computing) 14,683 473 Start High
92 Have I Been Pwned? 14,579 470 Start High
93 Phone hacking 14,200 458 Start Mid
94 Script kiddie 14,090 454 Start Mid
95 Keychain (software) 13,966 450 Start Low
96 Zscaler 13,964 450 Start Low
97 News International phone hacking scandal 13,756 443 C Mid
98 Gen Digital 13,258 427 C High
99 Sneakers (1992 film) 13,245 427 B Low
100 EICAR test file 13,210 426 C Low
101 Morris worm 13,156 424 C High
102 Malwarebytes (software) 13,128 423 C Mid
103 Voter-verified paper audit trail 13,089 422 C High
104 Role-based access control 13,043 420 C Mid
105 Spyware 12,966 418 B High
106 Penetration test 12,619 407 C Mid
107 Advanced persistent threat 12,591 406 B High
108 Intrusion detection system 12,522 403 Start High
109 ReCAPTCHA 12,496 403 B Mid
110 Data breach 12,453 401 C Mid
111 Dynamic-link library 12,446 401 C Unknown
112 Right to privacy 12,366 398 C High
113 Integer overflow 12,278 396 Start Unknown
114 Red team 12,226 394 GA Low
115 Wi-Fi Protected Setup 12,202 393 C Mid
116 Tails (operating system) 12,153 392 Start Mid
117 Black hat (computer security) 12,121 391 C Mid
118 Hardware security module 11,947 385 Start Mid
119 Ashley Madison data breach 11,928 384 Start Mid
120 Cyberwarfare 11,837 381 C High
121 Bitdefender 11,719 378 C Mid
122 Gary McKinnon 11,691 377 C High
123 Children's Online Privacy Protection Act 11,486 370 Start Low
124 Trellix 11,479 370 B Mid
125 Web cache 11,207 361 Start Low
126 OpenBSD 11,201 361 B High
127 Bangladesh Bank robbery 11,174 360 C Low
128 LulzSec 11,154 359 B High
129 Phreaking 11,013 355 C Mid
130 Botnet 10,999 354 C High
131 Nmap 10,957 353 C Mid
132 Same-origin policy 10,936 352 Start High
133 Microsoft Defender Antivirus 10,859 350 C Mid
134 Lockbit 10,858 350 C High
135 Cyberspace 10,851 350 C High
136 Timeline of events associated with Anonymous 10,836 349 C Low
137 List of security hacking incidents 10,639 343 List High
138 Security information and event management 10,601 341 Start Mid
139 VeraCrypt 10,512 339 C High
140 CCleaner 10,449 337 C High
141 ID.me 10,351 333 Start Low
142 Buffer overflow 10,285 331 B High
143 Protection ring 10,215 329 B High
144 Security Assertion Markup Language 10,208 329 C Low
145 Electronic Frontier Foundation 10,186 328 C High
146 Maia arson crimew 10,160 327 GA Low
147 Timeline of computer viruses and worms 10,130 326 Start High
148 Sudo 10,066 324 B Low
149 RADIUS 10,044 324 C Mid
150 Avast 9,987 322 B Mid
151 Security-Enhanced Linux 9,977 321 C High
152 Federal Information Processing Standards 9,862 318 Start Low
153 SAML 2.0 9,792 315 C Low
154 Adrian Lamo 9,784 315 C High
155 List of warez groups 9,679 312 Start Mid
156 Fancy Bear 9,642 311 C High
157 OpenID 9,581 309 B Low
158 OceanLotus 9,573 308 Stub Low
159 Bitwarden 9,555 308 C Mid
160 Dahua Technology 9,534 307 B Low
161 Searx 9,470 305 C Unknown
162 Identity management 9,430 304 C High
163 Certified information systems security professional 9,421 303 C Mid
164 Personal identification number 9,411 303 C High
165 Password manager 9,399 303 C Mid
166 File-system permissions 9,364 302 C High
167 Electronic voting 9,346 301 C Unknown
168 Common Vulnerability Scoring System 9,329 300 C High
169 Hacktivism 9,303 300 C High
170 Exploit (computer security) 9,186 296 Start High
171 Access control 9,182 296 Start High
172 Log4Shell 9,129 294 C Mid
173 United States Cyber Command 9,118 294 B High
174 Security through obscurity 9,100 293 C Mid
175 Podesta emails 9,096 293 C Low
176 The Tor Project 9,092 293 C Top
177 Keystroke logging 9,050 291 C Low
178 Access-control list 9,027 291 Start High
179 Low Orbit Ion Cannon 8,995 290 Start Low
180 ChaCha20-Poly1305 8,974 289 C Low
181 Metasploit 8,865 285 C Mid
182 Petya (malware family) 8,679 279 C High
183 Lightning Network 8,598 277 Start Low
184 OWASP 8,585 276 C Low
185 Len Sassaman 8,307 267 C Low
186 YubiKey 8,305 267 Start Low
187 SentinelOne 8,297 267 Start Unknown
188 Null character 8,228 265 Start Mid
189 Avast Antivirus 8,194 264 Start Mid
190 Backdoor (computing) 8,093 261 C Mid
191 2011 PlayStation Network outage 7,968 257 C Mid
192 Brain (computer virus) 7,920 255 C Low
193 Tiny Banker Trojan 7,827 252 C Low
194 Kill switch 7,815 252 Stub Unknown
195 NTLM 7,768 250 C Mid
196 Kill chain 7,666 247 Start Unknown
197 Sophos 7,631 246 Start Mid
198 Marcus Hutchins 7,614 245 C Mid
199 Bug bounty program 7,569 244 C High
200 Norton AntiVirus 7,566 244 C Mid
201 KeePass 7,490 241 C Mid
202 Vulnerability (computing) 7,392 238 Start Top
203 Address space layout randomization 7,233 233 C High
204 Jim Browning (YouTuber) 7,153 230 Start Low
205 Iptables 7,114 229 Start Mid
206 Microsoft Intune 7,111 229 Start Mid
207 Lapsus$ 7,053 227 C Low
208 Jay Chaudhry 6,999 225 Stub Low
209 Sony BMG copy protection rootkit scandal 6,997 225 B Low
210 Email spoofing 6,921 223 Start Mid
211 Scammer Payback 6,892 222 Start Mid
212 Patch Tuesday 6,848 220 C Mid
213 Row hammer 6,832 220 GA Low
214 1Password 6,826 220 C Low
215 Attribute-based access control 6,823 220 C Mid
216 Hybrid warfare 6,803 219 C High
217 Memory safety 6,729 217 Stub Unknown
218 Object-capability model 6,693 215 Start Mid
219 Burp Suite 6,672 215 Stub Low
220 Software cracking 6,657 214 Start Mid
221 Obfuscation (software) 6,594 212 C Mid
222 Cozy Bear 6,580 212 C Mid
223 Darktrace 6,557 211 Start Low
224 Arbitrary code execution 6,513 210 Stub High
225 Physical security 6,512 210 C Top
226 Certified ethical hacker 6,502 209 Start Low
227 Mutual authentication 6,499 209 Stub Low
228 Digital forensics 6,449 208 GA High
229 Let's Encrypt 6,433 207 B Low
230 Moxie Marlinspike 6,429 207 B Low
231 Password cracking 6,425 207 C High
232 Collision avoidance system 6,417 207 C Mid
233 Weev 6,414 206 Start Low
234 NIST Cybersecurity Framework 6,411 206 Start Top
235 Root certificate 6,342 204 Start Mid
236 IDN homograph attack 6,288 202 C Mid
237 The Cuckoo's Egg (book) 6,277 202 Start Low
238 LastPass 6,233 201 Start Low
239 Off-by-one error 6,211 200 Start Unknown
240 Operation Aurora 6,169 199 C Mid
241 Yahoo! data breaches 6,151 198 C Mid
242 ESET 6,141 198 Start Low
243 Offensive Security Certified Professional 6,043 194 Start Mid
244 Chinese wall 6,010 193 C Low
245 Jeremy Hammond 5,986 193 C Low
246 Paywall 5,953 192 C Mid
247 List of hacker groups 5,952 192 Start Mid
248 Lattice-based cryptography 5,917 190 Start Low
249 Samsung Knox 5,913 190 Start Mid
250 Trend Micro 5,882 189 C High
251 Whitelist 5,828 188 Start Low
252 Jonathan James 5,808 187 Start Low
253 Open banking 5,797 187 C Low
254 List of cyberattacks 5,787 186 List High
255 Web of trust 5,652 182 C Low
256 CryptoLocker 5,587 180 C Mid
257 Intel Active Management Technology 5,565 179 C High
258 Billion laughs attack 5,536 178 Start Low
259 Clickjacking 5,489 177 B Mid
260 ClamAV 5,484 176 Start Unknown
261 Mydoom 5,476 176 Start Mid
262 KeePassXC 5,454 175 Start Low
263 Cult of the Dead Cow 5,444 175 C Mid
264 Network security 5,441 175 Start High
265 SpyEye 5,401 174 Stub Unknown
266 CyberArk 5,343 172 C Low
267 Tiger team 5,338 172 Start Unknown
268 Replay attack 5,311 171 C High
269 Ron Rivest 5,299 170 Start High
270 Fake news website 5,260 169 C Low
271 AVG AntiVirus 5,214 168 Start Low
272 Code injection 5,192 167 C High
273 Wiz (company) 5,165 166 Start Low
274 ActionScript 5,152 166 C Low
275 Operation Trojan Shield 5,150 166 C Low
276 Port scanner 5,147 166 B High
277 Cyber Resilience Act 5,145 165 C Low
278 Return-oriented programming 5,138 165 C High
279 Hector Monsegur 5,086 164 Stub Low
280 Threat model 5,073 163 Start Low
281 Common Criteria 5,067 163 Start Low
282 Technical support scam 5,053 163 GA Mid
283 MAC spoofing 5,044 162 Start Unknown
284 Bell–LaPadula model 5,041 162 C Low
285 Albert Gonzalez 5,035 162 C Mid
286 John the Ripper 5,032 162 Start Low
287 DarkSide (hacker group) 5,031 162 Start Low
288 ISC2 5,028 162 Start Mid
289 Evaluation Assurance Level 4,998 161 Start Low
290 Credential stuffing 4,994 161 C High
291 Non-repudiation 4,959 159 Start Mid
292 Bruce Schneier 4,893 157 Start High
293 Automatic Certificate Management Environment 4,860 156 Start Low
294 Content Security Policy 4,840 156 C High
295 Netfilter 4,831 155 C Mid
296 Chief information security officer 4,822 155 Start Mid
297 Goatse Security 4,811 155 Start Low
298 DNS sinkhole 4,790 154 Start Unknown
299 Chaos Computer Club 4,768 153 C Mid
300 Sandworm (hacker group) 4,748 153 Stub High
301 AACS encryption key controversy 4,743 153 GA Low
302 Nintendo data leak 4,726 152 C Low
303 Cold boot attack 4,714 152 C Low
304 Shellshock (software bug) 4,702 151 C High
305 CalyxOS 4,631 149 C Low
306 Jacob Appelbaum 4,604 148 B Low
307 Cyber-security regulation 4,592 148 C High
308 Melissa (computer virus) 4,573 147 Start Unknown
309 Proofpoint, Inc. 4,538 146 Start Low
310 Voice phishing 4,509 145 Stub Mid
311 Mirror site 4,490 144 Start Mid
312 ISACA 4,396 141 Start Low
313 Timing attack 4,385 141 C Mid
314 Time-of-check to time-of-use 4,349 140 Start Low
315 Code Red (computer worm) 4,339 139 Start Low
316 Security token 4,314 139 C High
317 Radia Perlman 4,270 137 C Mid
318 Information security standards 4,238 136 C Top
319 Endpoint detection and response 4,237 136 Start Low
320 Offensive Security 4,226 136 C Low
321 Third-party cookies 4,211 135 C Low
322 Ungoogled-chromium 4,209 135 Start Low
323 COBIT 4,200 135 Start High
324 Dangling pointer 4,184 134 C Mid
325 Dictionary attack 4,170 134 C High
326 DNS spoofing 4,168 134 Start Mid
327 Internet security 4,158 134 C High
328 EC-Council 4,092 132 Start Mid
329 Dan Kaminsky 4,072 131 B Mid
330 Contingency plan 4,064 131 Start High
331 Climatic Research Unit email controversy 4,060 130 B Low
332 Creeper and Reaper 4,046 130 Start Low
333 List of password managers 4,040 130 List Low
334 Kevin Poulsen 4,007 129 Start Mid
335 Pegasus Project (investigation) 4,000 129 C Low
336 DREAD (risk assessment model) 3,989 128 Start Low
337 2016 Democratic National Committee email leak 3,983 128 C Mid
338 Hack Forums 3,971 128 C Low
339 Nessus (software) 3,968 128 Start Low
340 Conficker 3,926 126 B Mid
341 List of cybercriminals 3,915 126 List Mid
342 2017 Ukraine ransomware attacks 3,910 126 C High
343 Pseudonymization 3,890 125 Start Unknown
344 Comparison of TLS implementations 3,889 125 List High
345 Internet leak 3,855 124 C High
346 Privacy law 3,845 124 Start High
347 Cyberwarfare by Russia 3,835 123 Start Mid
348 Fork (blockchain) 3,791 122 Start Low
349 Snort (software) 3,790 122 Start Mid
350 Operation Olympic Games 3,789 122 Start Mid
351 GoFetch 3,776 121 Unknown Unknown
352 AAA (computer security) 3,748 120 Start Low
353 Aubrey Cottle 3,739 120 C Mid
354 Daniel J. Bernstein 3,726 120 C Mid
355 OneTrust 3,703 119 C Low
356 PLA Unit 61398 3,682 118 Start Mid
357 Mandatory access control 3,675 118 C High
358 Avira 3,672 118 C Low
359 Electronic voting in the United States 3,668 118 B Mid
360 SANS Institute 3,594 115 Start Mid
361 Office of Personnel Management data breach 3,581 115 C High
362 Dmitri Alperovitch 3,557 114 Start Low
363 Wickr 3,536 114 C Mid
364 DDoS attacks on Dyn 3,535 114 C Mid
365 Communications security 3,508 113 Start Mid
366 Java KeyStore 3,500 112 Stub Low
367 Whiz Kids (TV series) 3,452 111 C Low
368 2007 cyberattacks on Estonia 3,427 110 Start High
369 Cyberwarfare by China 3,422 110 C High
370 Cain and Abel (software) 3,415 110 Start Low
371 INCA Internet 3,413 110 C Unknown
372 Fail2ban 3,395 109 Start Mid
373 Chaos Communication Congress 3,317 107 Start Low
374 Imperva 3,316 106 Start Unknown
375 Shellcode 3,310 106 B High
376 Magic Lantern (software) 3,308 106 Stub Unknown
377 Flame (malware) 3,299 106 C Mid
378 Acceptable use policy 3,289 106 Start Mid
379 Evil maid attack 3,281 105 C Mid
380 Diameter (protocol) 3,276 105 Start Low
381 Computer forensics 3,273 105 C High
382 Secure by design 3,270 105 Start High
383 List of computer security certifications 3,266 105 List Mid
384 Forcepoint 3,265 105 Start Unknown
385 Buffer overflow protection 3,251 104 C Mid
386 File inclusion vulnerability 3,244 104 Start Mid
387 Team Xecuter 3,241 104 Stub Low
388 Blaster (computer worm) 3,238 104 Start Low
389 Cytrox 3,230 104 C Low
390 Markus Hess 3,227 104 Start Low
391 2600: The Hacker Quarterly 3,183 102 Start Mid
392 Symantec Endpoint Protection 3,181 102 GA Low
393 Click fraud 3,139 101 Start Low
394 BleachBit 3,135 101 C Low
395 Mermaids (charity) 3,119 100 Start Low
396 Hashcat 3,118 100 C Low
397 Endpoint security 3,069 99 Stub Unknown
398 BeyondTrust 3,058 98 Stub Low
399 Certificate Transparency 3,042 98 C High
400 Coordinated vulnerability disclosure 3,039 98 Stub High
401 Qihoo 360 3,029 97 Start Low
402 Comparison of computer viruses 3,025 97 List High
403 Discretionary access control 3,023 97 Stub Mid
404 Fake news websites in the United States 3,019 97 Start Low
405 DarkMatter Group 3,014 97 C Low
406 Shoulder surfing (computer security) 2,994 96 C Low
407 EPrivacy Directive 2,989 96 C Low
408 Capability-based security 2,981 96 Start High
409 Common Weakness Enumeration 2,979 96 Start Low
410 Electronic voting machine 2,978 96 Start Low
411 Secure cookie 2,972 95 Start High
412 Data security 2,957 95 Start High
413 System Management Mode 2,954 95 Start High
414 360 Safeguard 2,950 95 Start Low
415 2015 Ukraine power grid hack 2,933 94 C Mid
416 F-Secure 2,927 94 Start Mid
417 CIH (computer virus) 2,926 94 Start Low
418 The Artifice Girl 2,919 94 Start Low
419 Smurf attack 2,906 93 C Mid
420 Conti (ransomware) 2,884 93 Start Low
421 Ping of death 2,880 92 Start Low
422 Anonymous and the Russian invasion of Ukraine 2,873 92 C Low
423 VMware Carbon Black 2,866 92 Start Unknown
424 FIPS 140 2,818 90 Start Low
425 Wardialing 2,811 90 Start Unknown
426 Hacking Team 2,810 90 B Mid
427 Computer and network surveillance 2,802 90 C Top
428 Blue Coat Systems 2,782 89 C Low
429 Data loss prevention software 2,773 89 Start Mid
430 Ankit Fadia 2,771 89 Start Low
431 Cybersecurity Maturity Model Certification 2,755 88 C Low
432 Encrypting File System 2,746 88 B Mid
433 Cyber spying 2,741 88 Start High
434 Data retention 2,730 88 C Low
435 Kaspersky bans and allegations of Russian government ties 2,694 86 C High
436 Security-focused operating system 2,663 85 List Mid
437 Dave Kleiman 2,647 85 Start Low
438 Van Eck phreaking 2,616 84 C Low
439 Access token 2,612 84 Start Mid
440 Shamoon 2,604 84 Start Mid
441 Application security 2,601 83 Start High
442 Confused deputy problem 2,599 83 Start High
443 Hacker Manifesto 2,591 83 Start Mid
444 SQL Slammer 2,586 83 Start Low
445 Darik's Boot and Nuke 2,577 83 Start Unknown
446 Drive-by download 2,551 82 Start High
447 Superfish 2,527 81 C High
448 Hacker ethic 2,522 81 C High
449 Security operations center 2,495 80 Start Low
450 Nulled 2,489 80 Start Unknown
451 Cylance 2,467 79 Start Low
452 Dynamic application security testing 2,463 79 Start Low
453 The Crash (2017 film) 2,448 78 Start Low
454 Tsutomu Shimomura 2,442 78 Start Unknown
455 Hardening (computing) 2,441 78 Start Mid
456 Blacklist (computing) 2,440 78 Start Mid
457 Tanium 2,427 78 Start Low
458 SAML metadata 2,410 77 C Low
459 FIPS 140-3 2,409 77 C Low
460 List of cyber warfare forces 2,399 77 Start Low
461 Protected Extensible Authentication Protocol 2,393 77 C Low
462 BREACH 2,374 76 Start High
463 Self-XSS 2,373 76 Start Low
464 Email hacking 2,360 76 Start Mid
465 Double Dragon (hacking group) 2,354 75 C Mid
466 Sub7 2,329 75 Start Mid
467 Privacy and blockchain 2,328 75 C Low
468 Entrust 2,320 74 Start Unknown
469 Regulation of self-driving cars 2,320 74 B Mid
470 Zero Days 2,319 74 Start Low
471 Information assurance 2,319 74 B High
472 Operation Payback 2,300 74 B Low
473 Chain of trust 2,295 74 Start Mid
474 British Library cyberattack 2,288 73 Start Low
475 Trusted timestamping 2,283 73 Start Unknown
476 Session fixation 2,283 73 Start High
477 HBGary 2,283 73 B Mid
478 Brian Krebs 2,274 73 Start Low
479 Quick Heal 2,267 73 Start Mid
480 Cheetah Mobile 2,257 72 C High
481 New generation warfare 2,252 72 Start Low
482 ISO/IEC 27002 2,241 72 Stub Low
483 Security testing 2,239 72 Stub Mid
484 ATT&CK 2,237 72 Stub Low
485 Anna Kournikova (computer virus) 2,234 72 C Mid
486 United States Army Cyber Command 2,218 71 Stub Low
487 Opportunistic TLS 2,208 71 Start Mid
488 Peiter Zatko 2,206 71 B Mid
489 Next-generation firewall 2,206 71 Start Low
490 The Open Group 2,205 71 Start High
491 Comparison of instant messaging protocols 2,201 71 List Low
492 ShadowCrew 2,197 70 C Low
493 Fortify Software 2,196 70 Start Unknown
494 Computer emergency response team 2,194 70 Start High
495 Google Safe Browsing 2,193 70 Start Unknown
496 Guccifer 2.0 2,179 70 B Low
497 Scareware 2,176 70 Start Mid
498 Russian interference in the 2020 United States elections 2,168 69 B Low
499 Heap spraying 2,159 69 Start Mid
500 Traffic analysis 2,159 69 C Low