Wikipedia:WikiProject Computer Security/Popular pages

This is a list of pages in the scope of Wikipedia:WikiProject Computer Security along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

List edit

Period: 2024-04-01 to 2024-04-30

Total views: 6,272,587

Updated: 10:32, 15 May 2024 (UTC)

Rank Page title Views Daily average Assessment Importance
1 HTTP cookie 293,133 9,771 C High
2 Electronic voting in India 122,666 4,088 B High
3 Blockchain 116,230 3,874 B Top
4 Phishing 112,590 3,753 B High
5 TamilRockers 107,715 3,590 Start Low
6 Anonymous (hacker group) 87,185 2,906 GA Mid
7 Facebook malware 86,791 2,893 Start Mid
8 Proxy server 80,119 2,670 C High
9 Pegasus (spyware) 78,601 2,620 B Low
10 Virtual private network 69,166 2,305 C Mid
11 Voter-verified paper audit trail 54,588 1,819 C High
12 Reality Winner 53,130 1,771 B Mid
13 ILOVEYOU 51,188 1,706 C Mid
14 Cloudflare 46,268 1,542 C Low
15 List of Tor onion services 45,555 1,518 List Low
16 Secure Shell 44,967 1,498 C Low
17 Privacy 43,747 1,458 C High
18 WhatsApp University 39,431 1,314 Start Low
19 Self-driving car 38,637 1,287 B Mid
20 Google hacking 38,124 1,270 Start Low
21 Kevin Mitnick 36,694 1,223 C High
22 WarGames 36,551 1,218 C Low
23 Facebook–Cambridge Analytica data scandal 36,034 1,201 C High
24 Indian WhatsApp lynchings 35,508 1,183 List High
25 DJI 33,928 1,130 C Low
26 Software testing 32,824 1,094 C Low
27 Cybercrime 32,807 1,093 C High
28 Multi-factor authentication 32,604 1,086 C High
29 Kali Linux 31,989 1,066 Start Mid
30 Man-in-the-middle attack 30,549 1,018 C Mid
31 Lolita City 29,719 990 Start Low
32 Malware 28,744 958 C Top
33 McAfee 27,578 919 C High
34 BIOS 27,397 913 B Mid
35 Ashley Madison 27,080 902 C Low
36 Hackers (film) 26,402 880 C Low
37 Zero-day vulnerability 25,952 865 C High
38 End-to-end encryption 25,887 862 C Mid
39 VirusTotal 25,845 861 Start High
40 Zip bomb 25,391 846 Start Low
41 Zero trust security model 25,384 846 C High
42 Russian interference in the 2016 United States elections 25,349 844 B High
43 Cryptographic hash function 25,050 835 C High
44 Mail and wire fraud 24,659 821 Start Mid
45 Pretty Good Privacy 23,717 790 B High
46 ISO/IEC 27001 23,171 772 Start High
47 Swatting 22,591 753 C Mid
48 OAuth 22,403 746 C Mid
49 Ransomware 22,022 734 GA High
50 Cross-site request forgery 21,926 730 C High
51 Adobe Flash 21,845 728 C Low
52 Trusted Platform Module 20,793 693 C High
53 Cross-site scripting 20,537 684 B High
54 Playpen (website) 20,177 672 Start Low
55 Certificate authority 20,030 667 C High
56 SQL injection 19,713 657 Start High
57 Information security 19,326 644 B Top
58 Social engineering (security) 19,324 644 C High
59 CrowdStrike 19,228 640 Start Unknown
60 Trojan horse (computing) 19,149 638 C High
61 Palo Alto Networks 19,105 636 C High
62 Common Vulnerability Scoring System 18,721 624 C High
63 Ross J. Anderson 18,586 619 C Low
64 Kerberos (protocol) 18,191 606 C High
65 Public key infrastructure 18,029 600 Start High
66 NSO Group 18,003 600 B Mid
67 Reverse engineering 17,968 598 C High
68 Kaspersky Lab 17,846 594 B Mid
69 Phreaking 17,552 585 C Mid
70 Lazarus Group 17,257 575 C Mid
71 Startpage.com 17,072 569 C Low
72 EICAR test file 16,972 565 C Low
73 Aladdin (BlackRock) 16,852 561 Stub Low
74 Have I Been Pwned? 16,571 552 Start High
75 Security hacker 16,285 542 C Top
76 Authentication 16,280 542 C High
77 STRIDE model 16,209 540 Start Low
78 Common Vulnerabilities and Exposures 16,024 534 C Top
79 Time-based one-time password 15,899 529 C High
80 Advanced persistent threat 15,713 523 B High
81 Electronic voting by country 15,640 521 C Unknown
82 Human–computer interaction 15,577 519 C Low
83 Ashley Madison data breach 15,562 518 Start Mid
84 Keychain (software) 15,434 514 Start Low
85 List of data breaches 15,342 511 List High
86 Vault 7 15,218 507 C Unknown
87 White hat (computer security) 15,058 501 Start Low
88 Sneakers (1992 film) 15,056 501 B Low
89 Aubrey Cottle 14,904 496 C Mid
90 Race condition 14,587 486 C Mid
91 Public key certificate 13,898 463 C High
92 Cyberwarfare 13,885 462 C High
93 Phone hacking 13,816 460 Start Mid
94 Payment Card Industry Data Security Standard 13,703 456 Start Low
95 Cozy Bear 13,490 449 C Mid
96 Maia arson crimew 13,328 444 GA Low
97 DMZ (computing) 13,273 442 Start High
98 Fortinet 13,264 442 GA Mid
99 SIM swap scam 13,250 441 Start Mid
100 Honeypot (computing) 13,208 440 Start High
101 ReCAPTCHA 13,063 435 B Mid
102 Intel Management Engine 13,002 433 C High
103 The Cuckoo's Egg (book) 12,944 431 Start Low
104 Brute-force attack 12,784 426 C High
105 2014 Sony Pictures hack 12,735 424 C High
106 List of the most common passwords 12,649 421 List Unknown
107 Gen Digital 12,562 418 C High
108 Zscaler 12,504 416 Start Low
109 Data breach 12,458 415 GA Mid
110 Jeremy Hammond 12,369 412 C Low
111 Spyware 12,306 410 B High
112 OpenBSD 12,276 409 B High
113 News International phone hacking scandal 12,074 402 C Mid
114 Malwarebytes (software) 12,050 401 C Mid
115 Role-based access control 11,984 399 C Mid
116 Right to privacy 11,794 393 C High
117 LulzSec 11,052 368 B High
118 Intrusion detection system 11,008 366 Start High
119 Morris worm 10,990 366 C High
120 Log4Shell 10,959 365 C Mid
121 Wi-Fi Protected Setup 10,944 364 C Mid
122 Penetration test 10,828 360 C Mid
123 Tails (operating system) 10,755 358 Start Mid
124 Integer overflow 10,749 358 Start Unknown
125 Red team 10,712 357 GA Low
126 Backdoor (computing) 10,666 355 C Mid
127 Black hat (computer security) 10,659 355 C Mid
128 Botnet 10,650 355 C High
129 Dynamic-link library 10,636 354 C Unknown
130 Hardware security module 10,553 351 Start Mid
131 Nmap 10,550 351 C Mid
132 Gary McKinnon 10,457 348 C High
133 Exploit (computer security) 10,392 346 Start High
134 Timeline of events associated with Anonymous 10,385 346 C Low
135 Searx 10,326 344 C Unknown
136 Microsoft Defender Antivirus 10,303 343 C Mid
137 Electronic voting 10,287 342 C Unknown
138 Bitdefender 10,141 338 C Mid
139 Security-Enhanced Linux 10,130 337 C High
140 Script kiddie 9,958 331 Start Mid
141 RADIUS 9,918 330 C Mid
142 Timeline of computer viruses and worms 9,807 326 Start High
143 CCleaner 9,788 326 C High
144 Trellix 9,769 325 B Mid
145 Security Assertion Markup Language 9,731 324 C Low
146 Sudo 9,630 321 B Low
147 ChaCha20-Poly1305 9,612 320 C Low
148 Protection ring 9,595 319 B High
149 Certified information systems security professional 9,571 319 C Mid
150 SAML 2.0 9,510 317 C Low
151 Federal Information Processing Standards 9,507 316 Start Low
152 Children's Online Privacy Protection Act 9,415 313 Start Low
153 OceanLotus 9,391 313 Stub Low
154 OpenID 9,331 311 B Low
155 Keystroke logging 9,326 310 C Low
156 Buffer overflow 9,276 309 B High
157 Bangladesh Bank robbery 9,255 308 C Low
158 Same-origin policy 9,165 305 Start High
159 Avast 9,128 304 B Mid
160 ID.me 9,065 302 Start Low
161 Bitwarden 8,974 299 C Mid
162 Identity management 8,901 296 C High
163 Cyber Resilience Act 8,851 295 C Low
164 Security information and event management 8,787 292 Start Mid
165 United States Cyber Command 8,691 289 B High
166 Cyberspace 8,669 288 C High
167 OWASP 8,669 288 C Low
168 Lattice-based cryptography 8,656 288 Start Low
169 Kids Online Safety Act 8,615 287 Start Low
170 Personal identification number 8,462 282 C High
171 Hacktivism 8,458 281 C High
172 Patch Tuesday 8,421 280 C Mid
173 VeraCrypt 8,411 280 C High
174 Electronic Frontier Foundation 8,360 278 C High
175 YubiKey 8,319 277 Start Low
176 The Tor Project 8,317 277 C Top
177 Password manager 8,293 276 C Mid
178 Access control 8,255 275 Start High
179 Dahua Technology 8,194 273 B Low
180 SpyEye 8,150 271 Stub Unknown
181 Fancy Bear 8,134 271 C High
182 Access-control list 8,133 271 Start High
183 Metasploit 8,068 268 C Mid
184 Address space layout randomization 8,060 268 C High
185 Darktrace 7,994 266 Start Low
186 Tiny Banker Trojan 7,983 266 C Low
187 Paywall 7,924 264 C Mid
188 File-system permissions 7,905 263 C High
189 Lightning Network 7,886 262 Start Low
190 Microsoft Intune 7,696 256 Start Mid
191 Norton AntiVirus 7,514 250 C Mid
192 Petya (malware family) 7,493 249 C High
193 Security through obscurity 7,405 246 C Mid
194 Avast Antivirus 7,392 246 Start Mid
195 Low Orbit Ion Cannon 7,387 246 Start Low
196 List of warez groups 7,385 246 Start Mid
197 Sophos 7,318 243 Start Mid
198 Marcus Hutchins 7,279 242 C Mid
199 Null character 7,257 241 Start Mid
200 Moxie Marlinspike 7,228 240 B Low
201 KeePass 7,190 239 C Mid
202 Kill switch 7,107 236 C Low
203 Brain (computer virus) 7,063 235 C Low
204 Web cache 7,058 235 Start Low
205 Scammer Payback 7,045 234 Start Mid
206 1Password 6,967 232 C Low
207 BlackCat (cyber gang) 6,965 232 Start Low
208 Burp Suite 6,950 231 Stub Low
209 Iptables 6,945 231 Start Mid
210 Certified ethical hacker 6,932 231 Start Low
211 List of security hacking incidents 6,925 230 List High
212 SentinelOne 6,876 229 Start Unknown
213 LastPass 6,843 228 Start Low
214 AXXo 6,823 227 Start Mid
215 Adrian Lamo 6,775 225 C High
216 NIST Cybersecurity Framework 6,735 224 Start Top
217 NTLM 6,719 223 C Mid
218 Jim Browning (YouTuber) 6,644 221 Start Low
219 Vulnerability (computing) 6,600 220 Start Top
220 Wiz (company) 6,592 219 Start Low
221 Sony BMG copy protection rootkit scandal 6,563 218 B Low
222 Chinese wall 6,528 217 C Low
223 Off-by-one error 6,452 215 Start Unknown
224 Electronic voting machine 6,438 214 Start Low
225 Billion laughs attack 6,409 213 Start Low
226 Len Sassaman 6,285 209 C Low
227 Climatic Research Unit email controversy 6,285 209 B Low
228 Pegasus Project (investigation) 6,275 209 C Low
229 Object-capability model 6,274 209 Start Mid
230 Lapsus$ 6,235 207 C Low
231 Row hammer 6,215 207 GA Low
232 Operation Trojan Shield 6,200 206 C Low
233 Lockbit 6,150 205 C High
234 Operation Olympic Games 6,047 201 Start Mid
235 Let's Encrypt 6,041 201 B Low
236 Attribute-based access control 6,002 200 C Mid
237 Hybrid warfare 5,990 199 C High
238 Root certificate 5,986 199 Start Mid
239 Mutual authentication 5,961 198 Stub Low
240 2011 PlayStation Network outage 5,945 198 C Mid
241 Podesta emails 5,943 198 C Low
242 Fake news website 5,939 197 C Low
243 Email spoofing 5,888 196 Start Mid
244 Yahoo! data breaches 5,838 194 B Mid
245 Obfuscation (software) 5,834 194 C Mid
246 Samsung Knox 5,821 194 Start Mid
247 List of hacker groups 5,795 193 Start Mid
248 Cult of the Dead Cow 5,773 192 C Mid
249 Jonathan James 5,771 192 Start Low
250 Collision avoidance system 5,757 191 C Mid
251 Bug bounty program 5,701 190 C High
252 Hector Monsegur 5,667 188 Stub Low
253 Weev 5,658 188 C Low
254 Credential stuffing 5,639 187 C High
255 Mydoom 5,618 187 Start Mid
256 Jennifer Arcuri 5,611 187 C Low
257 ESET 5,606 186 Start Low
258 Digital forensics 5,520 184 GA High
259 ClamAV 5,496 183 Start Unknown
260 Sandworm (hacker group) 5,433 181 Stub High
261 Jay Chaudhry 5,392 179 Stub Low
262 Port scanner 5,378 179 B High
263 Network security 5,345 178 Start High
264 John the Ripper 5,344 178 Start Low
265 Whitelist 5,329 177 Start Low
266 CyberArk 5,326 177 C Low
267 Ian Coldwater 5,324 177 Start Mid
268 Third-party cookies 5,287 176 C Low
269 Clickjacking 5,285 176 B Mid
270 Password cracking 5,284 176 C High
271 Operation Aurora 5,267 175 C Mid
272 AVG AntiVirus 5,226 174 Start Low
273 Nintendo data leak 5,224 174 C Low
274 Intel Active Management Technology 5,190 173 C High
275 Return-oriented programming 5,149 171 C High
276 Shellshock (software bug) 5,118 170 C High
277 Open banking 5,083 169 C Low
278 DNS sinkhole 5,082 169 Start Unknown
279 Trend Micro 5,081 169 C High
280 List of cyberattacks 5,079 169 List High
281 Threat model 5,075 169 Start Low
282 Physical security 5,062 168 C Top
283 Tiger team 5,038 167 Start Unknown
284 Offensive Security Certified Professional 4,974 165 Start Mid
285 Dmitri Alperovitch 4,958 165 Start Low
286 Web of trust 4,916 163 C Low
287 Technical support scam 4,893 163 GA Mid
288 Ron Rivest 4,886 162 Start High
289 KeePassXC 4,854 161 Start Low
290 Security testing 4,802 160 Stub Mid
291 Automatic Certificate Management Environment 4,787 159 Start Low
292 ISC2 4,753 158 Start Mid
293 Content Security Policy 4,729 157 C High
294 ActionScript 4,683 156 C Low
295 Replay attack 4,672 155 C High
296 Fork (blockchain) 4,652 155 Start Low
297 Software cracking 4,621 154 Start Mid
298 Netfilter 4,620 154 C Mid
299 PLA Unit 61398 4,576 152 Start Mid
300 Albert Gonzalez 4,552 151 C Mid
301 Evaluation Assurance Level 4,543 151 Start Low
302 Chaos Computer Club 4,527 150 C Mid
303 Code Red (computer worm) 4,519 150 Start Low
304 MAC spoofing 4,500 150 Start Unknown
305 Arbitrary code execution 4,434 147 Stub High
306 Bell–LaPadula model 4,418 147 C Low
307 IDN homograph attack 4,380 146 C Mid
308 Mirror site 4,374 145 Start Mid
309 Mermaids (charity) 4,315 143 Start Low
310 CalyxOS 4,309 143 C Low
311 Endpoint detection and response 4,275 142 Start Low
312 Offensive Security 4,273 142 C Low
313 Ungoogled-chromium 4,250 141 Start Low
314 Bruce Schneier 4,224 140 Start High
315 ISACA 4,215 140 Start Low
316 Electronic voting in the United States 4,161 138 B Mid
317 Conficker 4,144 138 B Mid
318 Markus Hess 4,141 138 Start Low
319 Time-of-check to time-of-use 4,126 137 Start Low
320 Privacy law 4,124 137 Start High
321 Chief information security officer 4,088 136 Start Mid
322 Melissa (computer virus) 4,086 136 Start Unknown
323 Security token 4,075 135 C High
324 Proofpoint, Inc. 4,072 135 Start Low
325 Internet security 4,070 135 C High
326 Cold boot attack 4,067 135 C Low
327 COBIT 4,047 134 Start High
328 Creeper and Reaper 4,030 134 Start Low
329 Contingency plan 4,017 133 Start High
330 NOBUS 3,976 132 Start High
331 DarkMatter Group 3,975 132 C Low
332 Goatse Security 3,940 131 Start Low
333 List of cybercriminals 3,935 131 List Mid
334 Code injection 3,898 129 C High
335 Daniel J. Bernstein 3,893 129 C Mid
336 Non-repudiation 3,884 129 Start Mid
337 2017 Ukraine ransomware attacks 3,858 128 C High
338 DREAD (risk assessment model) 3,844 128 Start Low
339 Snort (software) 3,842 128 Start Mid
340 Common Criteria 3,830 127 Start Low
341 Internet leak 3,830 127 C High
342 Cyberwarfare by China 3,803 126 C High
343 Nessus (software) 3,778 125 Start Low
344 Flame (malware) 3,777 125 C Mid
345 CryptoLocker 3,775 125 C Mid
346 AAA (computer security) 3,762 125 Start Low
347 Secure by design 3,760 125 Start High
348 Pseudonymization 3,749 124 Start Unknown
349 List of password managers 3,685 122 List Low
350 DNS spoofing 3,664 122 Start Mid
351 Voice phishing 3,597 119 Stub Mid
352 Hack Forums 3,586 119 C Low
353 CIH (computer virus) 3,562 118 Start Low
354 EC-Council 3,559 118 Start Mid
355 2016 Democratic National Committee email leak 3,534 117 C Mid
356 Timing attack 3,522 117 C Mid
357 Office of Personnel Management data breach 3,474 115 C High
358 Acceptable use policy 3,467 115 Start Mid
359 OneTrust 3,457 115 C Low
360 Zero Days 3,389 112 Start Low
361 Java KeyStore 3,382 112 Stub Low
362 DarkSide (hacker group) 3,374 112 Start Low
363 Dangling pointer 3,356 111 C Mid
364 Dictionary attack 3,328 110 C High
365 F-Secure 3,321 110 Start Mid
366 RSA Conference 3,308 110 Start Mid
367 Kevin Poulsen 3,300 110 Start Mid
368 Radia Perlman 3,286 109 C Mid
369 Information security standards 3,248 108 C Top
370 National Vulnerability Database 3,233 107 Stub High
371 Dan Kaminsky 3,219 107 B Mid
372 SANS Institute 3,217 107 Start Mid
373 Blaster (computer worm) 3,195 106 Start Low
374 Evil maid attack 3,187 106 C Mid
375 Computer forensics 3,167 105 C High
376 Diameter (protocol) 3,145 104 Start Low
377 DDoS attacks on Dyn 3,143 104 C Mid
378 AACS encryption key controversy 3,105 103 GA Low
379 Communications security 3,092 103 Start Mid
380 Wickr 3,082 102 C Mid
381 Fail2ban 3,074 102 Start Mid
382 2600: The Hacker Quarterly 3,062 102 Start Mid
383 Cyber-security regulation 3,054 101 C High
384 2007 cyberattacks on Estonia 3,036 101 Start High
385 Avira 3,020 100 C Low
386 BeyondTrust 3,002 100 Stub Low
387 Forcepoint 2,976 99 Start Unknown
388 Mandatory access control 2,966 98 C High
389 Shellcode 2,941 98 B High
390 List of computer security certifications 2,941 98 List Mid
391 File inclusion vulnerability 2,935 97 Start Mid
392 Data security 2,931 97 Start High
393 Capability-based security 2,925 97 Start High
394 Cyberwarfare by Russia 2,916 97 Start Mid
395 Memory safety 2,906 96 C Low
396 Comparison of computer viruses 2,900 96 List High
397 Van Eck phreaking 2,900 96 C Low
398 Fake news websites in the United States 2,878 95 B High
399 Kaspersky bans and allegations of Russian government ties 2,877 95 C High
400 Endpoint security 2,873 95 Stub Unknown
401 Buffer overflow protection 2,848 94 C Mid
402 Coordinated vulnerability disclosure 2,842 94 Stub High
403 Cain and Abel (software) 2,831 94 Start Low
404 Imperva 2,824 94 Start Unknown
405 EPrivacy Directive 2,816 93 C Low
406 FIPS 140 2,772 92 Start Low
407 Application security 2,761 92 Start High
408 Qihoo 360 2,751 91 Start Low
409 2015 Ukraine power grid hack 2,733 91 C Mid
410 Data retention 2,730 91 C Low
411 Symantec Endpoint Protection 2,712 90 GA Low
412 Next-generation firewall 2,695 89 Start Low
413 Google Safe Browsing 2,682 89 Start Unknown
414 Einstein (US-CERT program) 2,677 89 B Mid
415 The Artifice Girl 2,648 88 Start Low
416 Certificate Transparency 2,632 87 C High
417 Shamoon 2,628 87 Start Mid
418 Hacker Manifesto 2,620 87 Start Mid
419 Security operations center 2,611 87 Start Low
420 Smurf attack 2,607 86 C Mid
421 Security-focused operating system 2,605 86 List Mid
422 Conti (ransomware) 2,601 86 Start Low
423 NOP slide 2,599 86 Stub Low
424 Entrust 2,586 86 Start Unknown
425 Darik's Boot and Nuke 2,580 86 Start Unknown
426 Computer emergency response team 2,578 85 Start High
427 Hashcat 2,571 85 C Low
428 Chaos Communication Congress 2,558 85 Start Low
429 HackThisSite 2,539 84 C Low
430 Encrypting File System 2,536 84 B Mid
431 Wardialing 2,527 84 Start Unknown
432 Cybersecurity Maturity Model Certification 2,522 84 C Low
433 Drive-by download 2,519 83 Start High
434 Tanium 2,513 83 Start Low
435 Data loss prevention software 2,508 83 Start Mid
436 Shoulder surfing (computer security) 2,493 83 C Low
437 Reception and criticism of WhatsApp security and privacy features 2,489 82 C Low
438 HackingTeam 2,480 82 B Mid
439 Discretionary access control 2,456 81 Stub Mid
440 Ping of death 2,451 81 Start Low
441 FIPS 140-3 2,450 81 C Low
442 Confused deputy problem 2,449 81 Start High
443 Whiz Kids (TV series) 2,441 81 C Low
444 Protected Extensible Authentication Protocol 2,434 81 C Low
445 Common Weakness Enumeration 2,428 80 Start Low
446 List of cyber warfare forces 2,428 80 Start Low
447 FORCEDENTRY 2,423 80 Start Low
448 The Crash (2017 film) 2,404 80 Start Low
449 Cyber spying 2,401 80 Start High
450 360 Safeguard 2,400 80 Start Low
451 Blue Coat Systems 2,396 79 C Low
452 Mobile security 2,387 79 C Top
453 Opportunistic TLS 2,386 79 Start Mid
454 Session fixation 2,380 79 Start High
455 Hardening (computing) 2,378 79 Start Mid
456 GhostNet 2,359 78 C Mid
457 Suricata (software) 2,356 78 Start Low
458 British Library cyberattack 2,353 78 Start Low
459 Dynamic application security testing 2,346 78 Start Low
460 ATT&CK 2,345 78 Stub Low
461 ISO/IEC 27002 2,297 76 Stub Low
462 Comparison of instant messaging protocols 2,296 76 List Low
463 Cylance 2,290 76 Start Low
464 VMware Carbon Black 2,280 76 Start Unknown
465 Attack surface 2,256 75 Stub Mid
466 Ankit Fadia 2,251 75 Start Low
467 Trusted timestamping 2,228 74 Start Unknown
468 Jacob Appelbaum 2,218 73 B Low
469 Computer and network surveillance 2,217 73 C Top
470 Cyberwarfare in the United States 2,209 73 Start Mid
471 Secure cookie 2,203 73 Start High
472 Click fraud 2,197 73 Start Low
473 System Management Mode 2,196 73 Start High
474 Hacker ethic 2,194 73 C High
475 Regulation of self-driving cars 2,185 72 B Mid
476 Cloud computing security 2,182 72 Start Unknown
477 Scareware 2,177 72 Start Mid
478 SAML metadata 2,174 72 C Low
479 Keeper (password manager) 2,169 72 Start Low
480 Access token 2,163 72 Start Mid
481 United States Army Cyber Command 2,159 71 Stub Low
482 Chain of trust 2,152 71 Start Mid
483 BREACH 2,149 71 Start High
484 Dark0de 2,138 71 Start Mid
485 Information sensitivity 2,127 70 Start Low
486 Email hacking 2,111 70 Start Mid
487 Rogue security software 2,095 69 C High
488 Kill chain (military) 2,095 69 Start Unknown
489 Cyber threat intelligence 2,091 69 Start Low
490 Comparison of TLS implementations 2,081 69 List High
491 Security Content Automation Protocol 2,070 69 C Mid
492 Threat actor 2,068 68 C Mid
493 Self-XSS 2,048 68 Start Low
494 Virtual machine escape 2,042 68 Start Low
495 LibreSSL 2,040 68 Start High
496 The Open Group 2,036 67 Start High
497 SQL Slammer 2,026 67 Start Low
498 New generation warfare 2,021 67 Start Low
499 Double Dragon (hacking group) 2,017 67 C Mid
500 Nulled 2,014 67 Start Unknown