Wikipedia:WikiProject Computer Security/Popular pages

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search

This is a list of pages in the scope of Wikipedia:WikiProject Computer Security along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

List[edit]

Period: 2021-09-01 to 2021-09-30

Total views: 6,710,124

Updated: 14:02, 12 October 2021 (UTC)

Rank Page title Views Daily average Assessment Importance
1 List of Tor onion services 768,446 25,614 List Low
2 HTTP cookie 449,781 14,992 C High
3 Blockchain 153,213 5,107 C Unknown
4 Pegasus (spyware) 99,990 3,333 B Low
5 Proxy server 92,038 3,067 C High
6 Anonymous (hacker group) 84,489 2,816 GA Mid
7 CAPTCHA 68,808 2,293 B High
8 Phishing 67,439 2,247 B High
9 Computer security 56,868 1,895 C Top
10 Trusted Platform Module 54,004 1,800 C High
11 Ransomware 46,411 1,547 GA High
12 Self-driving car 42,214 1,407 C Low
13 Cryptographic hash function 40,719 1,357 C High
14 Multi-factor authentication 40,369 1,345 C High
15 Software testing 38,744 1,291 C Low
16 BIOS 38,432 1,281 C Mid
17 Malware 37,948 1,264 C Top
18 Kevin Mitnick 37,351 1,245 C High
19 Hackers (film) 36,719 1,223 C Low
20 Kali Linux 36,553 1,218 Start Mid
21 WarGames 35,972 1,199 C Low
22 NSO Group 35,369 1,178 B Mid
23 Man-in-the-middle attack 35,078 1,169 C Mid
24 Cloudflare 34,317 1,143 C Low
25 Cybercrime 34,242 1,141 C High
26 Facebook–Cambridge Analytica data scandal 31,247 1,041 Start High
27 Lolita City 30,954 1,031 Start Low
28 Pretty Good Privacy 30,247 1,008 B High
29 Trojan horse (computing) 30,114 1,003 C High
30 McAfee 29,794 993 C High
31 Zero-day (computing) 29,252 975 C High
32 Firewall (computing) 28,682 956 C Top
33 Certificate authority 28,083 936 C High
34 Information security 27,905 930 B Top
35 Security hacker 27,718 923 C Top
36 Cross-site scripting 27,643 921 B High
37 SQL injection 27,590 919 Start High
38 Adobe Flash 26,481 882 C Low
39 End-to-end encryption 26,337 877 C Mid
40 Public key certificate 26,196 873 C High
41 Avast Antivirus 25,493 849 Start Mid
42 Mail and wire fraud 24,920 830 Start Mid
43 Cross-site request forgery 24,759 825 C High
44 ISO/IEC 27001 24,285 809 Start High
45 Antivirus software 24,133 804 B Top
46 Social engineering (security) 23,610 787 C High
47 ILOVEYOU 22,590 753 C Mid
48 Google hacking 22,410 747 Start Low
49 Public key infrastructure 22,269 742 Start High
50 Ashley Madison 21,603 720 C Low
51 List of the most common passwords 20,941 698 List Unknown
52 CCleaner 20,872 695 Start High
53 Russian interference in the 2016 United States elections 20,226 674 B High
54 Brute-force attack 20,145 671 C High
55 Reverse engineering 19,895 663 C High
56 Race condition 19,477 649 C Mid
57 White hat (computer security) 19,474 649 Start Low
58 Payment Card Industry Data Security Standard 19,384 646 Start Low
59 Computer worm 19,052 635 C Mid
60 Dynamic-link library 18,448 614 C Unknown
61 Sony Pictures hack 18,345 611 C High
62 Penetration test 17,635 587 C Mid
63 DMZ (computing) 17,583 586 Start High
64 Wi-Fi Protected Setup 17,528 584 C Mid
65 Gary McKinnon 17,069 568 C High
66 CrowdStrike 16,967 565 Start Unknown
67 Honeypot (computing) 16,715 557 Start High
68 Jonathan James 16,712 557 Start Low
69 Kaspersky Lab 16,616 553 B High
70 Zscaler 16,121 537 Start Low
71 Intrusion detection system 16,092 536 Start High
72 Security Assertion Markup Language 15,946 531 C Low
73 Intel Management Engine 15,719 523 C High
74 Script kiddie 15,570 519 Start Mid
75 Fortinet 15,507 516 GA Mid
76 Keystroke logging 15,338 511 C Low
77 Spyware 15,209 506 B High
78 Time-based One-Time Password 15,182 506 C High
79 Have I Been Pwned? 15,080 502 Start High
80 Ankit Fadia 15,005 500 Start Low
81 Credential stuffing 14,991 499 C High
82 Certified Information Systems Security Professional 14,886 496 C Mid
83 Swatting 14,742 491 C Mid
84 Role-based access control 14,718 490 C Mid
85 Hardware security module 14,676 489 Start Mid
86 Right to privacy 14,532 484 Start Unknown
87 Keychain (software) 14,503 483 Start Low
88 Integer overflow 14,465 482 Start Unknown
89 SAML 2.0 14,328 477 C Low
90 Privacy 13,983 466 C High
91 Palo Alto Networks 13,931 464 C High
92 VirusTotal 13,930 464 Start High
93 STRIDE (security) 13,919 463 Stub Unknown
94 Avast 13,749 458 B Mid
95 Children's Online Privacy Protection Act 13,736 457 Start Low
96 2021 Epik data breach 13,722 457 B Mid
97 Zip bomb 13,703 456 Start Unknown
98 Zero trust security model 13,563 452 C High
99 Cyberwarfare 13,402 446 C High
100 Self-XSS 13,332 444 Unknown Unknown
101 Authentication 13,275 442 C High
102 NortonLifeLock 13,171 439 C High
103 Botnet 13,070 435 C High
104 News International phone hacking scandal 13,007 433 C Mid
105 Security information and event management 12,975 432 Start Mid
106 Nmap 12,736 424 C Mid
107 List of data breaches 12,649 421 List High
108 Bitdefender 12,573 419 C Mid
109 ReCAPTCHA 12,547 418 B Mid
110 Buffer overflow 12,401 413 B High
111 Vulnerability (computing) 12,378 412 Start Top
112 Same-origin policy 12,320 410 Start High
113 Advanced persistent threat 12,313 410 C High
114 Lazarus Group 12,310 410 C Mid
115 LulzSec 12,267 408 B High
116 Tails (operating system) 12,249 408 Start Mid
117 Fake news website 11,985 399 C Low
118 Sneakers (1992 film) 11,776 392 B Low
119 Timeline of computer viruses and worms 11,447 381 Start High
120 Access-control list 11,248 374 Start High
121 Access control 11,085 369 Start High
122 Cyberspace 11,002 366 C High
123 Data breach 10,992 366 C Mid
124 Identity management 10,978 365 C Unknown
125 Norton AntiVirus 10,901 363 C Mid
126 Password cracking 10,881 362 C High
127 List of warez groups 10,878 362 Start Mid
128 Adrian Lamo 10,875 362 C High
129 Common Vulnerabilities and Exposures 10,869 362 Start Unknown
130 Sudo 10,849 361 B Low
131 File-system permissions 10,807 360 C Low
132 Whitelisting 10,759 358 Start Low
133 Spoofing attack 10,690 356 Start Mid
134 Air gap (networking) 10,341 344 C Mid
135 OpenBSD 10,338 344 B High
136 Protection ring 10,313 343 B High
137 Morris worm 10,279 342 C High
138 Weev 10,259 341 Start Low
139 VeraCrypt 10,202 340 C High
140 Pegasus Project (investigation) 10,108 336 C Low
141 Malwarebytes (software) 10,083 336 C Mid
142 ANOM 9,626 320 C Low
143 Phreaking 9,611 320 C Mid
144 Mutual authentication 9,542 318 Stub Low
145 List of security hacking incidents 9,530 317 List High
146 Iptables 9,435 314 Start Mid
147 The Tor Project 9,401 313 C Top
148 Network security 9,320 310 Start High
149 EICAR test file 9,238 307 Stub Low
150 Bangladesh Bank robbery 9,227 307 C Low
151 Web cache 9,211 307 Start Low
152 Backdoor (computing) 9,201 306 C Mid
153 Electronic Frontier Foundation 9,193 306 C High
154 Jay Chaudhry 9,181 306 Stub Low
155 Email spoofing 9,152 305 Start Mid
156 Ashley Madison data breach 9,014 300 Start Mid
157 YubiKey 8,865 295 Start Low
158 AVG AntiVirus 8,788 292 Start Low
159 Hacktivism 8,727 290 C High
160 Jim Browning (YouTuber) 8,698 289 Start Low
161 OWASP 8,690 289 Start Low
162 Tiny Banker Trojan 8,658 288 C Low
163 Metasploit Project 8,645 288 C Mid
164 Phone hacking 8,633 287 Start Mid
165 Fancy Bear 8,616 287 C High
166 Obfuscation (software) 8,553 285 C Mid
167 United States Cyber Command 8,541 284 B High
168 Certified Ethical Hacker 8,497 283 Start Low
169 Sophos 8,268 275 Unknown Unknown
170 Computer security software 8,236 274 Start High
171 Kill chain 8,223 274 Start Unknown
172 Null character 8,205 273 Start Mid
173 Clickjacking 8,155 271 Start Mid
174 Tripwire (company) 8,146 271 C Low
175 Patch Tuesday 8,045 268 C Mid
176 Marcin Kleczynski 7,943 264 Start Low
177 Security-Enhanced Linux 7,908 263 C High
178 LastPass 7,900 263 Start Low
179 Federal Information Processing Standards 7,890 263 Start Low
180 Let's Encrypt 7,843 261 B Low
181 Black hat (computer security) 7,842 261 Stub Mid
182 List of hacker groups 7,835 261 Start Mid
183 COBIT 7,827 260 Start High
184 Wickr 7,810 260 C Mid
185 Searx 7,750 258 C Unknown
186 Fork (blockchain) 7,719 257 Start Low
187 Grey hat 7,537 251 Start Mid
188 Low Orbit Ion Cannon 7,533 251 Start Low
189 Contingency plan 7,514 250 Start High
190 Technical support scam 7,465 248 C Mid
191 2011 PlayStation Network outage 7,442 248 C Mid
192 Digital forensics 7,413 247 GA High
193 Common Vulnerability Scoring System 7,369 245 C High
194 Replay attack 7,135 237 C High
195 Address space layout randomization 6,993 233 C High
196 Bug bounty program 6,974 232 C High
197 Electronic voting by country 6,897 229 C Unknown
198 Moxie Marlinspike 6,860 228 Start Unknown
199 DNS rebinding 6,859 228 Start Low
200 Security through obscurity 6,835 227 C Mid
201 Shellshock (software bug) 6,796 226 C High
202 Hybrid warfare 6,792 226 C High
203 NT LAN Manager 6,785 226 C Mid
204 Open banking 6,722 224 Start Low
205 Cult of the Dead Cow 6,690 223 C Mid
206 Software cracking 6,678 222 Start Mid
207 Paywall 6,621 220 C Mid
208 Internet security 6,621 220 C High
209 Non-repudiation 6,556 218 Start Mid
210 List of cyberattacks 6,463 215 List High
211 Billion laughs attack 6,428 214 Start Low
212 Quick Heal 6,386 212 Start Mid
213 NIST Cybersecurity Framework 6,378 212 Start Top
214 Physical security 6,373 212 C Top
215 Kill switch 6,341 211 Stub Unknown
216 Mydoom 6,293 209 Start Mid
217 Samsung Knox 6,278 209 Start Mid
218 ESET 6,201 206 Start Low
219 Threat model 6,181 206 Start Low
220 SentinelOne 6,168 205 Start Unknown
221 CyberArk 6,157 205 C Low
222 Exploit (computer security) 6,135 204 Start High
223 FireEye 6,125 204 B Mid
224 Nessus (software) 6,110 203 Start Low
225 Security token 6,091 203 C High
226 Privilege escalation 6,080 202 Start Mid
227 ID.me 6,066 202 Start Low
228 Cybersecurity standards 6,002 200 C Top
229 1Password 5,949 198 Start Low
230 DarkMatter (Emirati company) 5,939 197 C Low
231 Trend Micro 5,910 197 C High
232 Dahua Technology 5,860 195 Start Unknown
233 Microsoft Endpoint Manager 5,827 194 Start Mid
234 Dangling pointer 5,800 193 C Mid
235 Root certificate 5,778 192 Start Mid
236 Yahoo! data breaches 5,723 190 C Mid
237 MAC spoofing 5,698 189 Start Unknown
238 Aladdin (BlackRock) 5,677 189 Stub Low
239 Darktrace 5,655 188 Start Low
240 Data loss prevention software 5,610 187 Start Mid
241 ActionScript 5,579 185 C Low
242 IDN homograph attack 5,557 185 C Mid
243 Hector Monsegur 5,553 185 Stub Low
244 Offensive Security Certified Professional 5,539 184 Start Mid
245 Return-oriented programming 5,539 184 C High
246 Code Red (computer worm) 5,535 184 Start Low
247 2020-2021 Nintendo data leak 5,525 184 Start Low
248 Jennifer Arcuri 5,511 183 C Unknown
249 Goatse Security 5,452 181 Start Low
250 Avira 5,374 179 C Low
251 Albert Gonzalez 5,277 175 C Mid
252 Code injection 5,242 174 C High
253 DarkSide (hacking group) 5,221 174 Start Low
254 Brain (computer virus) 5,199 173 C Low
255 Endpoint security 5,138 171 Stub Unknown
256 Content Security Policy 5,132 171 C High
257 Dictionary attack 5,088 169 C High
258 Collision avoidance system 5,088 169 C Mid
259 Port scanner 5,067 168 B High
260 Endpoint detection and response 5,063 168 Start Low
261 Computer forensics 5,061 168 C High
262 Symantec Endpoint Protection 5,044 168 GA Low
263 List of password managers 5,021 167 List Low
264 ISACA 5,012 167 Start Low
265 Sony BMG copy protection rootkit scandal 4,974 165 B Low
266 Internet leak 4,955 165 C High
267 FORCEDENTRY 4,941 164 Start Low
268 Ron Rivest 4,940 164 Start High
269 Chinese wall 4,916 163 C Low
270 John the Ripper 4,890 163 Start Unknown
271 Dan Kaminsky 4,890 163 B Mid
272 DDoS attack on Dyn 4,877 162 C Mid
273 Cain and Abel (software) 4,819 160 Start Low
274 Arbitrary code execution 4,806 160 Stub High
275 Climatic Research Unit email controversy 4,795 159 B Low
276 Voice phishing 4,793 159 Stub Mid
277 Chief information security officer 4,769 158 Start Mid
278 Bruce Schneier 4,735 157 Start High
279 Mirror site 4,727 157 Start Mid
280 Privacy law 4,716 157 Start High
281 Row hammer 4,674 155 GA Low
282 AAA (computer security) 4,621 154 Start Low
283 Kevin Poulsen 4,594 153 Start Mid
284 Cold boot attack 4,593 153 C Unknown
285 Comparison of computer viruses 4,574 152 List High
286 Jeremy Hammond 4,566 152 C Low
287 Clam AntiVirus 4,557 151 Start Unknown
288 Bell–LaPadula model 4,538 151 B Low
289 Chaos Computer Club 4,484 149 C Mid
290 Intel Active Management Technology 4,476 149 C High
291 VMware Carbon Black 4,467 148 Start Unknown
292 Encrypting File System 4,458 148 B Mid
293 Podesta emails 4,422 147 C Low
294 Kaspersky Anti-Virus 4,381 146 Start Low
295 Application security 4,355 145 Start High
296 Four Horsemen of the Infocalypse 4,348 144 Start Low
297 Off-by-one error 4,345 144 Start Unknown
298 The Cuckoo's Egg (book) 4,337 144 Start Low
299 Secure by design 4,334 144 Start Unknown
300 Zero Days 4,330 144 Start Low
301 Data security 4,285 142 Start High
302 SpyEye 4,271 142 Stub Unknown
303 Operation Aurora 4,246 141 C Mid
304 Ping of death 4,205 140 Start Low
305 Mandatory access control 4,172 139 C High
306 HMA (VPN) 4,166 138 Start Low
307 DNS sinkhole 4,166 138 Start Unknown
308 Pseudonymization 4,160 138 Start Unknown
309 CryptoLocker 4,154 138 C Mid
310 Click fraud 4,144 138 Start Low
311 Common Criteria 4,113 137 Start Low
312 Kaspersky Internet Security 4,040 134 Start Low
313 Blaster (computer worm) 4,002 133 Start Low
314 List of computer criminals 3,988 132 FL Mid
315 Buffer overflow protection 3,963 132 C Mid
316 Netfilter 3,929 130 C Mid
317 Cozy Bear 3,911 130 C Mid
318 Automated Certificate Management Environment 3,907 130 Stub Unknown
319 Conficker 3,885 129 B Mid
320 2016 Democratic National Committee email leak 3,869 128 Start Mid
321 The Crash (2017 film) 3,862 128 Start Low
322 Shellcode 3,843 128 B High
323 Google Safe Browsing 3,838 127 Start Unknown
324 Evil twin (wireless networks) 3,834 127 Start Mid
325 Ungoogled-chromium 3,807 126 Start Low
326 Tiger team 3,796 126 Start Unknown
327 DREAD (risk assessment model) 3,749 124 Stub Low
328 Comparison of TLS implementations 3,742 124 List High
329 Secure cookie 3,732 124 Start High
330 Offensive Security 3,715 123 C Low
331 Next-generation firewall 3,712 123 Start Low
332 Trishneet Arora 3,683 122 Start Unknown
333 Mobile security 3,682 122 C Top
334 Timing attack 3,677 122 Start Unknown
335 Snort (software) 3,674 122 Start Mid
336 Secure cryptoprocessor 3,666 122 Unknown Unknown
337 List of computer security certifications 3,651 121 List Mid
338 Hashcat 3,620 120 C Low
339 Blue Coat Systems 3,603 120 C Low
340 Time-of-check to time-of-use 3,594 119 Start Low
341 Hacking Team 3,590 119 B Mid
342 Hardening (computing) 3,559 118 Start Mid
343 Tanium 3,538 117 Start Low
344 Qihoo 360 3,535 117 Start Low
345 Dynamic application security testing 3,525 117 Start Low
346 Attack surface 3,521 117 Stub Mid
347 Entrust 3,505 116 Start Unknown
348 Shamoon 3,498 116 Start Mid
349 ISO/IEC 27002 3,494 116 Stub Low
350 Troy Hunt 3,493 116 Start Low
351 Trusted timestamping 3,484 116 Start Unknown
352 Microsoft Security Essentials 3,479 115 FA Mid
353 Proofpoint, Inc. 3,479 115 Start Low
354 Daniel J. Bernstein 3,435 114 Start Mid
355 Dmitri Alperovitch 3,427 114 Start Low
356 Melissa (computer virus) 3,427 114 Start Unknown
357 Cloud computing security 3,392 113 Start Unknown
358 Web shell 3,390 113 Start Unknown
359 SANS Institute 3,368 112 Start Mid
360 Forcepoint 3,333 111 Start Unknown
361 Operation Olympic Games 3,332 111 Start Mid
362 Darik's Boot and Nuke 3,315 110 Start Unknown
363 Hacker Manifesto 3,313 110 Start Mid
364 Flame (malware) 3,312 110 C Mid
365 Opportunistic TLS 3,298 109 Start Mid
366 2017 cyberattacks on Ukraine 3,287 109 C High
367 Lattice-based cryptography 3,270 109 Start Low
368 PLA Unit 61398 3,240 108 Start Mid
369 File inclusion vulnerability 3,231 107 Start Mid
370 Access token 3,223 107 Start Mid
371 Smurf attack 3,222 107 Start Mid
372 Confused deputy problem 3,196 106 Start High
373 Ukraine power grid hack 3,191 106 Start Mid
374 Communications security 3,181 106 Start Mid
375 Acceptable use policy 3,180 106 Start Mid
376 BeyondTrust 3,155 105 Stub Unknown
377 2007 cyberattacks on Estonia 3,152 105 Start High
378 Jacob Appelbaum 3,149 104 Start Low
379 Discretionary access control 3,137 104 Stub Mid
380 Pass the hash 3,133 104 C Mid
381 Chronicle Security 3,128 104 Stub Low
382 Security-focused operating system 3,113 103 List Mid
383 Potentially unwanted program 3,104 103 C Mid
384 Van Eck phreaking 3,086 102 C Low
385 Koobface 3,077 102 C Low
386 Information assurance 3,008 100 B High
387 Shoulder surfing (computer security) 2,973 99 Unknown Unknown
388 360 Safeguard 2,968 98 Start Low
389 Security controls 2,957 98 Start Top
390 Chain of trust 2,925 97 Start Mid
391 AACS encryption key controversy 2,922 97 GA Low
392 IT risk management 2,917 97 Start High
393 Blue team (computer security) 2,890 96 Start Unknown
394 Scareware 2,888 96 Start Mid
395 Cheetah Mobile 2,874 95 C High
396 F-Secure 2,873 95 Start Mid
397 Blacklist (computing) 2,871 95 Start Mid
398 Anna Kournikova (computer virus) 2,862 95 C Mid
399 Rogue security software 2,857 95 C High
400 Conti (ransomware) 2,852 95 Start Low
401 CIH (computer virus) 2,849 94 Start Low
402 Capability-based security 2,848 94 Start High
403 Creeper (program) 2,809 93 Start Low
404 Norton 360 2,801 93 C Mid
405 Host-based intrusion detection system 2,800 93 Start Low
406 Webroot 2,795 93 Start Low
407 Fail2ban 2,787 92 Start Mid
408 Computer and network surveillance 2,770 92 C Top
409 Comparison of firewalls 2,766 92 Start High
410 Evil maid attack 2,765 92 C Mid
411 Hacker ethic 2,757 91 C High
412 Mobile device forensics 2,746 91 Start Mid
413 Security management 2,708 90 Start High
414 Drive-by download 2,673 89 Start High
415 Keybase 2,665 88 Start Low
416 Cyberwarfare by Russia 2,655 88 Start Mid
417 Information technology controls 2,652 88 Start High
418 FIPS 140 2,639 87 Start Low
419 SAML metadata 2,636 87 Unknown Unknown
420 K7 Total Security 2,616 87 Unknown Unknown
421 Cyber-security regulation 2,601 86 C High
422 Keeper (password manager) 2,600 86 Start Low
423 Office of Personnel Management data breach 2,591 86 C High
424 Len Sassaman 2,581 86 C Low
425 List of cyber warfare forces 2,580 86 Start Low
426 Cisco ASA 2,580 86 Start Low
427 Cyberwarfare by China 2,558 85 B High
428 Directory traversal attack 2,551 85 Start Low
429 SMS spoofing 2,527 84 Unknown Unknown
430 Windows Firewall 2,519 83 Start High
431 Mermaids (charity) 2,513 83 Start Low
432 Computer emergency response team 2,487 82 Start High
433 Cylance 2,484 82 Start Low
434 2600: The Hacker Quarterly 2,478 82 Start Mid
435 Paper shredder 2,453 81 Unknown Unknown
436 Chaos Communication Congress 2,448 81 Start Low
437 Pharming 2,445 81 Start Mid
438 NOP slide 2,436 81 Stub Low
439 Superfish 2,433 81 C High
440 Cyberwarfare in the United States 2,406 80 Start Mid
441 Cyber threat intelligence 2,406 80 Start Low
442 Guccifer 2.0 2,399 79 B Low
443 Security operations center 2,392 79 Start Low
444 System Management Mode 2,391 79 Start High
445 Security Technical Implementation Guide 2,380 79 Unknown Unknown
446 Sniffing attack 2,378 79 Start Mid
447 Radia Perlman 2,374 79 C Mid
448 HackThisSite 2,371 79 C Low
449 Indicator of compromise 2,367 78 Unknown Unknown
450 Responsible disclosure 2,342 78 Stub High
451 LibreSSL 2,342 78 Start High
452 Dave Kleiman 2,334 77 Start Low
453 EC-Council 2,327 77 Start Mid
454 Tsutomu Shimomura 2,310 77 Start Unknown
455 Certificate Transparency 2,302 76 Start High
456 ISO/IEC 27000 2,292 76 Start Mid
457 Session fixation 2,278 75 Start High
458 Trusted computing base 2,269 75 B Mid
459 WS-Security 2,266 75 Stub Low
460 Macro virus 2,261 75 Start Unknown
461 Taxation in China 2,255 75 Start Low
462 SpyHunter (software) 2,240 74 Stub Low
463 CYREN 2,238 74 B Mid
464 Virtual machine escape 2,222 74 Start Low
465 Return-to-libc attack 2,219 73 Start High
466 Memory safety 2,217 73 Stub Unknown
467 OpenCandy 2,217 73 Stub Low
468 SQL Slammer 2,212 73 Start Low
469 Imperva 2,207 73 Start Unknown
470 Computer Misuse Act 1990 2,187 72 C Low
471 Kaspersky bans and allegations of Russian government ties 2,186 72 C Low
472 Gutmann method 2,170 72 C Mid
473 Browser hijacking 2,164 72 Start High
474 Passwordless authentication 2,162 72 C Low
475 Security testing 2,161 72 Stub Mid
476 Trusted Computer System Evaluation Criteria 2,158 71 Start Mid
477 Opal Storage Specification 2,157 71 Start Mid
478 Orbot 2,156 71 Stub Low
479 Self-destruct 2,147 71 C Low
480 Spybot – Search & Destroy 2,143 71 Start High
481 (ISC)² 2,142 71 Start Mid
482 Cryptovirology 2,133 71 Start Mid
483 Open mail relay 2,112 70 Start Unknown
484 Fortify Software 2,107 70 Start Unknown
485 Privacy and blockchain 2,105 70 C Low
486 High Orbit Ion Cannon 2,100 70 C Mid
487 Information sensitivity 2,089 69 Unknown Unknown
488 Secureworks 2,088 69 Start Unknown
489 Unified threat management 2,079 69 Start Low
490 Wardialing 2,073 69 Start Unknown
491 The Open Group 2,061 68 Start High
492 NoScript 2,056 68 C Mid
493 Gringo: The Dangerous Life of John McAfee 2,055 68 Stub Low
494 Man-in-the-browser 2,055 68 C Mid
495 Sub7 2,055 68 Start Mid
496 Browser security 2,038 67 C Mid
497 Key server (cryptographic) 2,038 67 Start Mid
498 HTTPS Everywhere 2,028 67 Start Low
499 Covert channel 2,017 67 Start Unknown
500 Social hacking 2,015 67 C Mid