Jump to content

Wikipedia:WikiProject Computer Security/Popular pages

From Wikipedia, the free encyclopedia

This is a list of pages in the scope of Wikipedia:WikiProject Computer Security along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

List

[edit]

Period: 2024-10-01 to 2024-10-31

Total views: 5,866,731

Updated: 18:21, 5 November 2024 (UTC)

Rank Page title Views Daily average Assessment Importance
1 HTTP cookie 332,632 10,730 C High
2 Len Sassaman 192,067 6,195 C Low
3 Blockchain 75,748 2,443 B Top
4 Pegasus (spyware) 66,566 2,147 B Low
5 Phishing 65,382 2,109 B High
6 Facebook malware 62,592 2,019 Start Mid
7 Anonymous (hacker group) 57,558 1,856 GA Mid
8 Indian WhatsApp lynchings 54,321 1,752 List High
9 Reality Winner 52,748 1,701 B Mid
10 Proxy server 51,861 1,672 B High
11 Virtual private network 48,044 1,549 C Mid
12 Russian interference in the 2016 United States elections 44,118 1,423 B High
13 TamilRockers 42,415 1,368 Start Low
14 Secure Shell 41,416 1,336 C Low
15 Cryptography 41,259 1,330 C Top
16 Self-driving car 41,096 1,325 B Mid
17 Cybercrime 37,712 1,216 C High
18 Cloudflare 35,757 1,153 C Low
19 List of Tor onion services 35,425 1,142 List Low
20 Software testing 35,398 1,141 C Low
21 Kevin Mitnick 35,202 1,135 C High
22 WarGames 34,101 1,100 C Low
23 DJI 32,378 1,044 C Low
24 ILOVEYOU 32,350 1,043 C Mid
25 CrowdStrike 32,207 1,038 B Mid
26 Lolita City 31,581 1,018 Start Low
27 Facebook–Cambridge Analytica data scandal 31,538 1,017 C High
28 Multi-factor authentication 30,872 995 C High
29 Have I Been Pwned? 30,171 973 Start High
30 EICAR test file 29,818 961 C Low
31 Meredith L. Patterson 29,405 948 C Mid
32 Zero-day vulnerability 29,369 947 C High
33 Malware 29,329 946 C Top
34 Google hacking 27,962 902 Start Low
35 Man-in-the-middle attack 27,434 884 C Mid
36 Electronic voting in India 26,432 852 GA High
37 Swatting 24,695 796 C Mid
38 Kali Linux 24,405 787 Start Mid
39 Cryptographic hash function 24,343 785 C High
40 BIOS 24,316 784 B Mid
41 Hackers (film) 23,175 747 C Low
42 Cross-site request forgery 23,032 742 C High
43 Single sign-on 22,493 725 C High
44 Pretty Good Privacy 22,480 725 B High
45 SQL injection 22,243 717 Start High
46 2011 PlayStation Network outage 21,710 700 C Mid
47 Ransomware 21,031 678 GA High
48 Information security 20,878 673 B Top
49 OAuth 20,713 668 C Mid
50 Trusted Platform Module 20,565 663 C High
51 VirusTotal 19,770 637 Start High
52 Adobe Flash 19,657 634 C Low
53 Palo Alto Networks 19,570 631 C High
54 Nintendo data leak 19,316 623 C Low
55 Trojan horse (computing) 19,237 620 C High
56 Cross-site scripting 19,181 618 B High
57 Keychain (software) 19,136 617 Start Low
58 Ashley Madison data breach 19,068 615 Start Mid
59 Certificate authority 18,635 601 C High
60 Social engineering (security) 18,348 591 C High
61 Time-based one-time password 18,078 583 C High
62 Playpen (website) 18,043 582 Start Low
63 Reverse engineering 17,870 576 C High
64 Mail and wire fraud 17,701 571 Start Mid
65 Kerberos (protocol) 17,490 564 C High
66 ReCAPTCHA 17,259 556 B Mid
67 Phone hacking 17,235 555 Start Mid
68 Lazarus Group 17,076 550 C Mid
69 Privacy 16,902 545 C High
70 Security hacker 16,695 538 C Top
71 Zip bomb 16,523 533 Start Low
72 Xbox Underground 16,454 530 C Low
73 Electronic voting 15,823 510 C Unknown
74 Synopsys 15,698 506 B Mid
75 STRIDE model 15,555 501 Start Low
76 Honeypot (computing) 15,473 499 Start High
77 Public key infrastructure 15,022 484 Start High
78 White hat (computer security) 14,994 483 Start Low
79 List of data breaches 14,969 482 List High
80 2014 Sony Pictures hack 14,683 473 C High
81 Payment Card Industry Data Security Standard 14,572 470 Start Low
82 Race condition 14,535 468 C Mid
83 Risk 14,511 468 C Top
84 End-to-end encryption 14,344 462 C Mid
85 Vault 7 14,010 451 C Unknown
86 Darktrace 13,966 450 Start Low
87 Human–computer interaction 13,944 449 C Low
88 Zscaler 13,897 448 Start Low
89 Zero trust security model 13,622 439 C High
90 Aladdin (BlackRock) 13,593 438 Stub Low
91 DMZ (computing) 13,401 432 Start High
92 SIM swap scam 13,321 429 Start Mid
93 Authentication 13,256 427 C High
94 Advanced persistent threat 13,090 422 B High
95 Morris worm 13,058 421 C High
96 Tails (operating system) 13,044 420 Start Mid
97 Brute-force attack 13,038 420 C High
98 Fortinet 12,872 415 GA Mid
99 Sub7 12,685 409 Start Mid
100 Script kiddie 12,671 408 Start Mid
101 Data breach 12,589 406 GA Mid
102 Operation Trojan Shield 12,560 405 C Low
103 Internet Archive cyberattack 12,507 403 Redirect NA
104 News International phone hacking scandal 12,484 402 C Mid
105 List of the most common passwords 12,392 399 List Unknown
106 Federal Information Processing Standards 12,297 396 Start Low
107 OpenBSD 12,289 396 B High
108 Common Vulnerabilities and Exposures 12,245 395 C Top
109 NSO Group 12,102 390 B Mid
110 Integer overflow 11,597 374 Start Unknown
111 Sneakers (1992 film) 11,594 374 B Low
112 Spyware 11,448 369 B High
113 Anonymous Sudan 11,251 362 C High
114 Okta, Inc. 11,244 362 Start Mid
115 Wiz (company) 11,207 361 Start Low
116 Bangladesh Bank robbery 11,194 361 C Low
117 Startpage.com 11,158 359 C Low
118 Phreaking 11,127 358 C Mid
119 Microsoft Defender Antivirus 11,015 355 C Mid
120 Penetration test 10,716 345 C Mid
121 Role-based access control 10,582 341 C Mid
122 ChaCha20-Poly1305 10,472 337 C Low
123 Right to privacy 10,468 337 C High
124 Bitwarden 10,391 335 C Mid
125 Dynamic-link library 10,241 330 C Unknown
126 Intel Management Engine 10,196 328 C High
127 Wi-Fi Protected Setup 10,159 327 C Mid
128 Cyberwarfare 10,078 325 C High
129 RADIUS 9,964 321 C Mid
130 CCleaner 9,910 319 C High
131 Salt Typhoon 9,834 317 C Unknown
132 Searx 9,771 315 C Unknown
133 Kill switch 9,664 311 C Low
134 Nmap 9,630 310 C Mid
135 Maia arson crimew 9,569 308 GA Low
136 Gary McKinnon 9,409 303 C High
137 Botnet 9,386 302 C High
138 Trellix 9,280 299 B Mid
139 Identity management 9,148 295 C High
140 The Tor Project 9,135 294 C Top
141 Security-Enhanced Linux 9,074 292 C High
142 Red team 8,884 286 GA Low
143 Hardware security module 8,870 286 Start Mid
144 Protection ring 8,859 285 B High
145 Sophos 8,832 284 Start Mid
146 Hacktivism 8,790 283 C High
147 Electronic voting by country 8,771 282 C Unknown
148 Sudo 8,765 282 B Low
149 Common Vulnerability Scoring System 8,714 281 C High
150 YubiKey 8,697 280 Start Low
151 Electronic Frontier Foundation 8,625 278 C High
152 Timeline of computer viruses and worms 8,598 277 Start High
153 Bradley Willman 8,539 275 B Low
154 Podesta emails 8,509 274 C Low
155 Keystroke logging 8,458 272 C Low
156 Operation Aurora 8,448 272 C Mid
157 Buffer overflow 8,426 271 B High
158 Same-origin policy 8,423 271 Start High
159 VeraCrypt 8,419 271 C High
160 Children's Online Privacy Protection Act 8,288 267 Start Low
161 Access control 8,279 267 C High
162 Black hat (computer security) 8,262 266 C Mid
163 KeePass 8,151 262 C Mid
164 Access-control list 8,098 261 Start High
165 Backdoor (computing) 8,063 260 C Mid
166 Cozy Bear 8,019 258 C Mid
167 Avast 8,018 258 B Mid
168 SpyEye 8,013 258 Stub Unknown
169 Cyber Resilience Act 8,001 258 C Low
170 OpenID 7,872 253 B Low
171 United States Cyber Command 7,743 249 B High
172 LulzSec 7,607 245 B High
173 File-system permissions 7,603 245 C High
174 Lapsus$ 7,552 243 C Low
175 SentinelOne 7,496 241 Start Unknown
176 List of warez groups 7,432 239 Start Mid
177 Foreign interference in the 2024 United States elections 7,427 239 C Low
178 Low Orbit Ion Cannon 7,373 237 Start Low
179 List of security hacking incidents 7,351 237 List High
180 SAML 2.0 7,343 236 C Low
181 Fancy Bear 7,332 236 C High
182 Malwarebytes (software) 7,312 235 C Mid
183 OWASP 7,289 235 C Low
184 Dave Kleiman 7,229 233 Start Low
185 Metasploit 7,216 232 C Mid
186 Yahoo data breaches 7,202 232 GA Mid
187 Address space layout randomization 7,168 231 C High
188 Microsoft Intune 7,152 230 Start Mid
189 Email spoofing 7,124 229 Start Mid
190 Hybrid warfare 7,113 229 C High
191 Personal identification number 7,081 228 C High
192 Cyberspace 7,062 227 C High
193 Null character 6,995 225 Start Mid
194 Log4Shell 6,957 224 C Mid
195 LockBit 6,891 222 C High
196 Chinese wall 6,865 221 C Low
197 Software cracking 6,857 221 Start Mid
198 Security through obscurity 6,844 220 C Mid
199 Conti (ransomware) 6,834 220 Start Low
200 1Password 6,801 219 C Low
201 Dahua Technology 6,773 218 B Low
202 Timeline of events associated with Anonymous 6,753 217 C Low
203 Certified Information Systems Security Professional 6,745 217 C Mid
204 Adrian Lamo 6,744 217 C High
205 NTLM 6,744 217 C Mid
206 NOBUS 6,731 217 Start High
207 CyberArk 6,726 216 C Low
208 Automatic Certificate Management Environment 6,712 216 Start Low
209 Norton AntiVirus 6,693 215 C Mid
210 Moxie Marlinspike 6,688 215 B Low
211 Password manager 6,685 215 C Mid
212 Burp Suite 6,617 213 Stub Low
213 Web cache 6,579 212 Start Low
214 Cult of the Dead Cow 6,575 212 C Mid
215 Patch Tuesday 6,533 210 C Mid
216 2016 Democratic National Committee email leak 6,492 209 C Mid
217 Jay Chaudhry 6,469 208 Stub Low
218 Fake news website 6,460 208 C Low
219 ESET 6,447 207 Start Low
220 NIST Cybersecurity Framework 6,436 207 Start Top
221 List of hacker groups 6,405 206 Start Mid
222 IntelBroker 6,296 203 B Low
223 Mutual authentication 6,241 201 Stub Low
224 Business continuity planning 6,232 201 B Mid
225 Samsung Knox 6,215 200 Start Mid
226 Bug bounty program 6,097 196 C High
227 Operation Olympic Games 6,070 195 Start Mid
228 Petya (malware family) 6,046 195 C High
229 Paywall 6,011 193 C Mid
230 List of cyberattacks 5,989 193 List High
231 Electronic voting in the United States 5,956 192 B Mid
232 Avast Antivirus 5,910 190 Start Mid
233 Technical support scam 5,849 188 GA Mid
234 KeePassXC 5,844 188 Start Low
235 Scammer Payback 5,808 187 Start Mid
236 Root certificate 5,798 187 Start Mid
237 Iptables 5,765 185 Start Mid
238 Lightning Network 5,753 185 Start Low
239 Return-oriented programming 5,707 184 C High
240 Dan Kaminsky 5,688 183 B Mid
241 Clickjacking 5,679 183 B Mid
242 Chaos Computer Club 5,660 182 C Mid
243 Off-by-one error 5,655 182 Start Unknown
244 Mydoom 5,655 182 Start Mid
245 Tiger team 5,638 181 Start Unknown
246 AACS encryption key controversy 5,606 180 GA Low
247 Lattice-based cryptography 5,586 180 Start Low
248 Let's Encrypt 5,566 179 B Low
249 Weev 5,534 178 C Low
250 Object-capability model 5,454 175 Start Mid
251 Mirror site 5,379 173 Start Mid
252 John the Ripper 5,354 172 Start Low
253 Code injection 5,287 170 C High
254 Russian interference in the 2024 United States elections 5,278 170 C Low
255 Ron Rivest 5,262 169 Start High
256 ActionScript 5,253 169 C Low
257 Voter-verified paper audit trail 5,242 169 C High
258 Brain (computer virus) 5,222 168 C Low
259 Obfuscation (software) 5,211 168 C Mid
260 Whitelist 5,205 167 Start Low
261 Billion laughs attack 5,187 167 Start Low
262 Attribute-based access control 5,156 166 C Mid
263 Evaluation Assurance Level 5,148 166 Start Low
264 Sony BMG copy protection rootkit scandal 5,138 165 B Low
265 ID.me 5,119 165 Start Low
266 Marcus Hutchins 5,118 165 C Mid
267 AVG AntiVirus 5,110 164 Start Low
268 DNS sinkhole 5,091 164 Start Unknown
269 Web of trust 5,071 163 C Low
270 Collision avoidance system 5,043 162 C Mid
271 British Library cyberattack 5,033 162 Start Low
272 23andMe data leak 5,003 161 Start Low
273 Jonathan James 4,937 159 Start Low
274 Tiny Banker Trojan 4,937 159 C Low
275 Fork (blockchain) 4,929 159 Start Low
276 Internet leak 4,806 155 C High
277 Network security 4,799 154 Start High
278 Certified ethical hacker 4,779 154 Start Low
279 List of cybercriminals 4,766 153 List Mid
280 Jim Browning (YouTuber) 4,759 153 Start Low
281 Chaos Communication Congress 4,754 153 Start Low
282 Digital forensics 4,737 152 GA High
283 Threat model 4,724 152 Start Low
284 Replay attack 4,721 152 C High
285 Code Red (computer worm) 4,714 152 Start Low
286 Physical security 4,701 151 C Top
287 LastPass 4,622 149 Start Low
288 ClamAV 4,600 148 Start Unknown
289 Endpoint detection and response 4,586 147 Start Low
290 Ungoogled-chromium 4,539 146 Start Low
291 Creeper and Reaper 4,512 145 Start Low
292 Bruce Schneier 4,451 143 Start High
293 Dmitri Alperovitch 4,432 142 C Low
294 Bell–LaPadula model 4,346 140 C Low
295 Time-of-check to time-of-use 4,314 139 Start Low
296 Offensive Security 4,291 138 C Low
297 BlackCat (cyber gang) 4,267 137 Start Low
298 Intel Active Management Technology 4,260 137 C High
299 Vendor 4,254 137 Start Low
300 Cyber kill chain 4,250 137 Stub Unknown
301 Shellshock (software bug) 4,228 136 C High
302 Pegasus Project (investigation) 4,227 136 C Low
303 Reception and criticism of WhatsApp security and privacy features 4,220 136 C Low
304 Row hammer 4,206 135 GA Low
305 Albert Gonzalez 4,178 134 C Mid
306 COBIT 4,140 133 Start High
307 Proofpoint, Inc. 4,110 132 Start Low
308 Content Security Policy 4,091 131 C High
309 SiegedSec 4,086 131 C Low
310 ISACA 4,078 131 Start Low
311 Netfilter 4,064 131 C Mid
312 Mitigation 4,044 130 Start Mid
313 CalyxOS 4,034 130 C Low
314 Melissa (computer virus) 4,009 129 Start Unknown
315 Credential stuffing 3,988 128 C High
316 Wickr 3,958 127 C Mid
317 Secureworks 3,908 126 Start Unknown
318 Bread Financial 3,878 125 Start Low
319 The Cuckoo's Egg (book) 3,862 124 Start Low
320 Open banking 3,856 124 C Low
321 Timing attack 3,843 123 C Mid
322 2017 Ukraine ransomware attacks 3,835 123 C High
323 Security token 3,832 123 C High
324 Jeremy Hammond 3,821 123 C Low
325 Conficker 3,819 123 B Mid
326 IDN homograph attack 3,808 122 C Mid
327 Port scanner 3,784 122 B High
328 Non-repudiation 3,777 121 Start Mid
329 Voice phishing 3,763 121 Stub Mid
330 Offensive Security Certified Professional 3,720 120 Start Mid
331 Daniel J. Bernstein 3,717 119 C Mid
332 Jennifer Arcuri 3,697 119 C Low
333 Contingency plan 3,694 119 Start High
334 Keeper (password manager) 3,688 118 Start Low
335 Cold boot attack 3,660 118 C Low
336 Nessus (software) 3,639 117 Start Low
337 Van Eck phreaking 3,621 116 C Low
338 Aubrey Cottle 3,603 116 C Mid
339 Hector Monsegur 3,587 115 Stub Low
340 Dictionary attack 3,584 115 C High
341 Dangling pointer 3,573 115 C Mid
342 DDoS attacks on Dyn 3,562 114 C Mid
343 Chief information security officer 3,487 112 Start Mid
344 Climatic Research Unit email controversy 3,431 110 B Low
345 Flame (malware) 3,398 109 C Mid
346 Common Criteria 3,393 109 Start Low
347 Cyberwarfare by China 3,388 109 C High
348 ISC2 3,349 108 Start Mid
349 List of password managers 3,342 107 List Low
350 Pseudonymization 3,341 107 Start Unknown
351 DarkSide (hacker group) 3,277 105 Start Low
352 Arbitrary code execution 3,276 105 C High
353 CYREN 3,272 105 B Mid
354 OneTrust 3,256 105 C Low
355 Cyber-security regulation 3,242 104 C High
356 BeyondTrust 3,234 104 Stub Low
357 DREAD (risk assessment model) 3,233 104 Start Low
358 DarkMatter Group 3,228 104 C Low
359 Kevin Poulsen 3,209 103 Start Mid
360 Third-party cookies 3,208 103 C Low
361 2007 cyberattacks on Estonia 3,205 103 Start High
362 Secure by design 3,149 101 Start High
363 Cyberwarfare by Russia 3,149 101 Start Mid
364 Roman Seleznev 3,126 100 Start Low
365 Cybersecurity Maturity Model Certification 3,097 99 C Low
366 Kill chain (military) 3,090 99 Start Unknown
367 Hashcat 3,083 99 C Low
368 BGP hijacking 3,078 99 Stub Mid
369 Java KeyStore 3,077 99 Stub Low
370 Comparison of instant messaging protocols 3,068 98 List Low
371 CryptoLocker 3,067 98 C Mid
372 Office of Personnel Management data breach 3,055 98 C High
373 Diameter (protocol) 3,053 98 Start Low
374 Internet security 3,030 97 C High
375 Endpoint security 3,016 97 Stub Unknown
376 Certificate Transparency 3,012 97 C High
377 Trusted Information Security Assessment Exchange 3,002 96 Stub Low
378 Avira 3,001 96 C Low
379 Privacy law 2,979 96 Start High
380 Tanium 2,970 95 Start Low
381 Entrust 2,969 95 Start Unknown
382 ATT&CK 2,968 95 Stub Low
383 Computer forensics 2,966 95 C High
384 Cellebrite UFED 2,956 95 C Low
385 Blaster (computer worm) 2,950 95 Start Low
386 Russian interference in the 2020 United States elections 2,950 95 B Low
387 Evil maid attack 2,948 95 C Mid
388 MAC spoofing 2,941 94 Start Unknown
389 Memory safety 2,935 94 C Low
390 SANS Institute 2,930 94 Start Mid
391 Zero Days 2,918 94 Start Low
392 PLA Unit 61398 2,895 93 Start Mid
393 Snort (software) 2,894 93 Start Mid
394 Comparison of computer viruses 2,889 93 List High
395 Mermaids (charity) 2,888 93 Start Low
396 Mandatory access control 2,869 92 C High
397 Rhysida (hacker group) 2,868 92 Start Low
398 Chinese interference in the 2024 United States elections 2,867 92 C Low
399 Iranian interference in the 2024 United States elections 2,847 91 Stub Mid
400 Trishneet Arora 2,838 91 Start Low
401 Fail2ban 2,836 91 Start Mid
402 Chain of trust 2,835 91 Start Mid
403 Federated identity 2,833 91 Start High
404 Authentication, authorization, and accounting 2,814 90 Start Mid
405 Hack Forums 2,787 89 C Low
406 CIH (computer virus) 2,786 89 Start Low
407 Dynamic application security testing 2,779 89 Start Low
408 Jacob Appelbaum 2,774 89 B Low
409 Email hacking 2,757 88 Start Mid
410 Application security 2,740 88 Start High
411 Shellcode 2,737 88 B High
412 Forcepoint 2,732 88 Start Unknown
413 Acceptable use policy 2,730 88 Start Mid
414 Whiz Kids (TV series) 2,725 87 C Low
415 Goatse Security 2,715 87 Start Low
416 Drive-by download 2,695 86 Start High
417 Shamoon 2,678 86 Start Mid
418 Information security standards 2,673 86 C Top
419 2015 Ukraine power grid hack 2,668 86 C Mid
420 EPrivacy Directive 2,658 85 C Low
421 FIPS 140 2,641 85 Start Low
422 Hacker ethic 2,638 85 C High
423 Market for zero-day exploits 2,636 85 C High
424 Wardialing 2,631 84 Start Unknown
425 Radia Perlman 2,631 84 C Mid
426 Mobile security 2,623 84 C Top
427 Data security 2,622 84 Start High
428 Troy Hunt 2,602 83 Start Low
429 Blue Coat Systems 2,601 83 C Low
430 Hacker Manifesto 2,591 83 Start Mid
431 Buffer overflow protection 2,567 82 C Mid
432 File inclusion vulnerability 2,564 82 Start Mid
433 Electronic voting machine 2,548 82 Start Low
434 Kaspersky and the Russian government 2,543 82 C High
435 2600: The Hacker Quarterly 2,536 81 Start Mid
436 Fake news websites in the United States 2,508 80 B High
437 Data loss prevention software 2,494 80 Start Mid
438 Cain and Abel (software) 2,475 79 Start Low
439 Virtual machine escape 2,457 79 Start Low
440 Uncomplicated Firewall 2,436 78 Stub Low
441 Cyber spying 2,433 78 Start High
442 Regulation of self-driving cars 2,425 78 B Mid
443 Shoulder surfing (computer security) 2,424 78 C Low
444 Darik's Boot and Nuke 2,421 78 Start Unknown
445 SQL Slammer 2,419 78 Start Low
446 Next-generation firewall 2,401 77 Start Low
447 Coordinated vulnerability disclosure 2,397 77 Stub High
448 Security-focused operating system 2,392 77 List Mid
449 Ping of death 2,368 76 Start Low
450 List of cyber warfare forces 2,362 76 Start Low
451 Dr.Web 2,361 76 Start Low
452 Trusted timestamping 2,360 76 Start Unknown
453 Quick Heal 2,352 75 Start Mid
454 The Crash (2017 film) 2,342 75 Start Low
455 Computer emergency response team 2,336 75 Start High
456 Killnet 2,335 75 Start Low
457 Confused deputy problem 2,319 74 Start High
458 Noname057(16) 2,319 74 C Low
459 Communications security 2,316 74 Start Mid
460 Cyberwarfare and Iran 2,309 74 Start Mid
461 The Artifice Girl 2,296 74 Start Low
462 YTCracker 2,294 74 Start Unknown
463 Computer and network surveillance 2,280 73 C Top
464 Threat actor 2,267 73 C Mid
465 BREACH 2,266 73 Start High
466 FIPS 140-3 2,260 72 C Low
467 New generation warfare 2,259 72 Start Low
468 Spybot – Search & Destroy 2,235 72 Start High
469 Hardening (computing) 2,232 72 Start Mid
470 Robin Sage 2,220 71 Start Mid
471 Symantec Endpoint Protection 2,212 71 GA Low
472 Capability-based security 2,200 70 Start High
473 Anna Kournikova (computer virus) 2,198 70 C Mid
474 Discretionary access control 2,192 70 Start Mid
475 Encrypting File System 2,187 70 B Mid
476 System Management Mode 2,175 70 Start High
477 Blacklist (computing) 2,168 69 Start Mid
478 Click fraud 2,166 69 C Low
479 InfraGard 2,163 69 Start High
480 Data retention 2,134 68 C Low
481 HackingTeam 2,126 68 B Mid
482 Security operations center 2,125 68 Start Low
483 Information sensitivity 2,115 68 Start Low
484 Self-XSS 2,093 67 Start Low
485 EC-Council 2,091 67 Start Mid
486 Secure cookie 2,087 67 Start High
487 Mark of the Web 2,084 67 Start Low
488 Nulled 2,078 67 Start Unknown
489 Tsutomu Shimomura 2,076 66 Start Unknown
490 Cyber threat intelligence 2,059 66 Start Low
491 Cyberwarfare and the United States 2,055 66 Start Mid
492 Ankit Fadia 2,053 66 Start Low
493 Crypto++ 2,051 66 C Low
494 Team Xecuter 2,048 66 Stub Low
495 Common Weakness Enumeration 2,045 65 Start Low
496 Comparison of TLS implementations 2,044 65 List High
497 Mantrap (access control) 2,041 65 Stub Low
498 Suricata (software) 2,031 65 Start Low
499 Computer Misuse Act 1990 2,017 65 C Low
500 Kaspersky Anti-Virus 2,016 65 Start Low