Wikipedia:WikiProject Computer Security/Popular pages

This is a list of pages in the scope of Wikipedia:WikiProject Computer Security along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

List

edit

Period: 2024-06-01 to 2024-06-30

Total views: 5,586,297

Updated: 00:58, 6 July 2024 (UTC)

Rank Page title Views Daily average Assessment Importance
1 HTTP cookie 238,419 7,947 C High
2 Cloudflare 96,119 3,203 C Low
3 Threat actor 89,014 2,967 C Mid
4 Facebook malware 86,390 2,879 Start Mid
5 Blockchain 79,796 2,659 B Top
6 Ashley Madison data breach 75,853 2,528 Start Mid
7 Pegasus (spyware) 69,060 2,302 B Low
8 Electronic voting in India 67,559 2,251 B High
9 Anonymous (hacker group) 66,960 2,232 GA Mid
10 Indian WhatsApp lynchings 51,820 1,727 List High
11 Phishing 50,789 1,692 B High
12 TamilRockers 49,993 1,666 Start Low
13 WarGames 49,009 1,633 C Low
14 Proxy server 46,235 1,541 C High
15 List of Tor onion services 45,606 1,520 List Low
16 Virtual private network 43,607 1,453 C Mid
17 Reality Winner 41,142 1,371 B Mid
18 Kevin Mitnick 40,518 1,350 C High
19 Google hacking 37,787 1,259 Start Low
20 Have I Been Pwned? 37,606 1,253 Start High
21 Secure Shell 34,316 1,143 C Low
22 Kaspersky Lab 33,550 1,118 B Mid
23 Russian interference in the 2016 United States elections 32,553 1,085 B High
24 Maia arson crimew 32,400 1,080 GA Low
25 Cybercrime 30,766 1,025 C High
26 Vault 7 30,741 1,024 C Unknown
27 Self-driving car 30,318 1,010 B Mid
28 Lolita City 30,197 1,006 Start Low
29 Man-in-the-middle attack 28,010 933 C Mid
30 DJI 27,428 914 C Low
31 CrowdStrike 27,170 905 Start Unknown
32 Hackers (film) 26,186 872 C Low
33 Multi-factor authentication 26,105 870 C High
34 Malware 25,681 856 C Top
35 ILOVEYOU 24,815 827 C Mid
36 Facebook–Cambridge Analytica data scandal 23,395 779 C High
37 Keychain (software) 22,864 762 Start Low
38 Zero-day vulnerability 22,657 755 C High
39 ISO/IEC 27001 22,419 747 Start High
40 Cryptographic hash function 22,271 742 C High
41 Palo Alto Networks 22,234 741 C High
42 Ransomware 22,145 738 GA High
43 McAfee 21,514 717 C High
44 End-to-end encryption 21,240 708 C Mid
45 BIOS 21,131 704 B Mid
46 Electronic voting 20,676 689 C Unknown
47 Kali Linux 20,662 688 Start Mid
48 Playpen (website) 20,408 680 Start Low
49 Cross-site request forgery 20,373 679 C High
50 OAuth 20,106 670 C Mid
51 Pretty Good Privacy 19,979 665 B High
52 Cross-site scripting 19,931 664 B High
53 Software testing 19,872 662 C Low
54 Synopsys 19,722 657 B Mid
55 Social engineering (security) 19,308 643 C High
56 LockBit 18,975 632 C High
57 Trusted Platform Module 18,758 625 C High
58 Adrian Lamo 18,538 617 C High
59 Adobe Flash 18,399 613 C Low
60 Swatting 18,247 608 C Mid
61 Certificate authority 18,052 601 C High
62 Information security 17,778 592 B Top
63 Privacy 17,538 584 C High
64 Mail and wire fraud 17,505 583 Start Mid
65 SIM swap scam 17,426 580 Start Mid
66 SQL injection 16,951 565 Start High
67 AXXo 16,915 563 Start Mid
68 Security hacker 16,584 552 C Top
69 Operation Trojan Shield 16,583 552 C Low
70 Trojan horse (computing) 16,427 547 C High
71 Electronic voting by country 15,126 504 C Unknown
72 Kerberos (protocol) 15,099 503 C High
73 Public key infrastructure 15,067 502 Start High
74 News International phone hacking scandal 15,016 500 C Mid
75 Reverse engineering 14,790 493 C High
76 Lazarus Group 14,667 488 C Mid
77 Script kiddie 14,369 478 Start Mid
78 EICAR test file 14,273 475 C Low
79 Race condition 14,059 468 C Mid
80 Time-based one-time password 13,941 464 C High
81 List of the most common passwords 13,789 459 List Unknown
82 Zip bomb 13,766 458 Start Low
83 Zero trust security model 13,752 458 C High
84 Phone hacking 13,674 455 Start Mid
85 Aladdin (BlackRock) 13,572 452 Stub Low
86 STRIDE model 13,353 445 Start Low
87 Common Vulnerabilities and Exposures 13,208 440 C Top
88 Gen Digital 13,167 438 C High
89 Zscaler 13,140 438 Start Low
90 List of data breaches 12,912 430 List High
91 Kill switch 12,852 428 C Low
92 Spyware 12,752 425 B High
93 Voter-verified paper audit trail 12,591 419 C High
94 Bradley Willman 12,531 417 B Low
95 Human–computer interaction 12,504 416 C Low
96 ReCAPTCHA 12,364 412 B Mid
97 Payment Card Industry Data Security Standard 12,354 411 Start Low
98 Fortinet 12,255 408 GA Mid
99 White hat (computer security) 12,211 407 Start Low
100 Federal Information Processing Standards 12,128 404 Start Low
101 Data breach 11,932 397 GA Mid
102 Keeper (password manager) 11,901 396 Start Low
103 DMZ (computing) 11,718 390 Start High
104 VirusTotal 11,705 390 Start High
105 2014 Sony Pictures hack 11,630 387 C High
106 Petya (malware family) 11,610 387 C High
107 NSO Group 11,598 386 B Mid
108 Searx 11,535 384 C Unknown
109 Penetration test 11,527 384 C Mid
110 Public key certificate 11,519 383 C High
111 Role-based access control 11,436 381 C Mid
112 Gary McKinnon 11,400 380 C High
113 Right to privacy 11,180 372 C High
114 Intel Management Engine 11,168 372 C High
115 Honeypot (computing) 10,969 365 Start High
116 Brute-force attack 10,753 358 C High
117 Authentication 10,503 350 C High
118 Advanced persistent threat 10,470 349 B High
119 Bitdefender 10,438 347 C Mid
120 Microsoft Defender Antivirus 10,406 346 C Mid
121 Black hat (computer security) 10,337 344 C Mid
122 Sneakers (1992 film) 10,267 342 B Low
123 Red team 10,135 337 GA Low
124 Timeline of events associated with Anonymous 10,110 337 C Low
125 2016 Democratic National Committee email leak 9,913 330 C Mid
126 OpenBSD 9,841 328 B High
127 Common Vulnerability Scoring System 9,675 322 C High
128 Dynamic-link library 9,534 317 C Unknown
129 LulzSec 9,307 310 B High
130 Sony BMG copy protection rootkit scandal 9,189 306 B Low
131 Integer overflow 9,162 305 Start Unknown
132 Phreaking 9,143 304 C Mid
133 Hardware security module 8,995 299 Start Mid
134 Startpage.com 8,947 298 C Low
135 Botnet 8,941 298 C High
136 Same-origin policy 8,857 295 Start High
137 Cyberwarfare 8,849 294 C High
138 Security-Enhanced Linux 8,847 294 C High
139 Wi-Fi Protected Setup 8,831 294 C Mid
140 Security Assertion Markup Language 8,821 294 C Low
141 United States Cyber Command 8,753 291 B High
142 Nmap 8,603 286 C Mid
143 Hacktivism 8,560 285 C High
144 The Tor Project 8,525 284 C Top
145 RADIUS 8,463 282 C Mid
146 Avast 8,304 276 B Mid
147 Timeline of computer viruses and worms 8,299 276 Start High
148 SAML 2.0 8,266 275 C Low
149 Identity management 8,253 275 C High
150 Malwarebytes (software) 8,241 274 C Mid
151 Tails (operating system) 8,219 273 Start Mid
152 Children's Online Privacy Protection Act 8,156 271 Start Low
153 Internet leak 8,143 271 C High
154 Trellix 8,106 270 B Mid
155 Podesta emails 8,062 268 C Low
156 Electronic Frontier Foundation 8,057 268 C High
157 Bitwarden 8,028 267 C Mid
158 Intrusion detection system 8,022 267 Start High
159 Fancy Bear 8,021 267 C High
160 Morris worm 7,974 265 C High
161 Sudo 7,974 265 B Low
162 Security information and event management 7,931 264 Start Mid
163 ChaCha20-Poly1305 7,863 262 C Low
164 2017 Ukraine ransomware attacks 7,793 259 C High
165 1Password 7,763 258 C Low
166 VeraCrypt 7,713 257 C High
167 Marcus Hutchins 7,693 256 C Mid
168 OpenID 7,671 255 B Low
169 Access-control list 7,658 255 Start High
170 Protection ring 7,648 254 B High
171 Cyberspace 7,646 254 C High
172 Patch Tuesday 7,563 252 C Mid
173 CCleaner 7,558 251 C High
174 Jim Browning (YouTuber) 7,551 251 Start Low
175 Email spoofing 7,497 249 Start Mid
176 Hybrid warfare 7,439 247 C High
177 YubiKey 7,387 246 Start Low
178 Exploit (computer security) 7,382 246 Start High
179 Scammer Payback 7,354 245 Start Mid
180 Buffer overflow 7,344 244 B High
181 Access control 7,291 243 Start High
182 Keystroke logging 7,269 242 C Low
183 File-system permissions 7,196 239 C High
184 Cyber Resilience Act 7,130 237 C Low
185 Password manager 7,114 237 C Mid
186 Electronic voting machine 7,090 236 Start Low
187 Norton AntiVirus 7,067 235 C Mid
188 Microsoft Intune 7,067 235 Start Mid
189 OWASP 6,988 232 C Low
190 Goatse Security 6,907 230 Start Low
191 Security through obscurity 6,851 228 C Mid
192 Metasploit 6,828 227 C Mid
193 Bangladesh Bank robbery 6,791 226 C Low
194 List of warez groups 6,704 223 Start Mid
195 List of security hacking incidents 6,586 219 List High
196 Moxie Marlinspike 6,581 219 B Low
197 Avast Antivirus 6,552 218 Start Mid
198 Low Orbit Ion Cannon 6,543 218 Start Low
199 KeePass 6,463 215 C Mid
200 Null character 6,456 215 Start Mid
201 NTLM 6,405 213 C Mid
202 Backdoor (computing) 6,375 212 C Mid
203 Web cache 6,327 210 Start Low
204 Certified ethical hacker 6,327 210 Start Low
205 Certified information systems security professional 6,321 210 C Mid
206 Tiny Banker Trojan 6,204 206 C Low
207 Fake news website 6,154 205 C Low
208 Password cracking 6,138 204 C High
209 Dahua Technology 6,131 204 B Low
210 Personal identification number 6,109 203 C High
211 Operation Aurora 6,056 201 C Mid
212 SentinelOne 6,043 201 Start Unknown
213 Vulnerability (computing) 5,977 199 Start Top
214 Kaspersky bans and allegations of Russian government ties 5,947 198 C High
215 Address space layout randomization 5,939 197 C High
216 ID.me 5,915 197 Start Low
217 Sophos 5,847 194 Start Mid
218 NIST Cybersecurity Framework 5,802 193 Start Top
219 Jay Chaudhry 5,767 192 Stub Low
220 SpyEye 5,761 192 Stub Unknown
221 ESET 5,738 191 Start Low
222 Darktrace 5,726 190 Start Low
223 Log4Shell 5,726 190 C Mid
224 Dmitri Alperovitch 5,721 190 Start Low
225 Iptables 5,695 189 Start Mid
226 Object-capability model 5,624 187 Start Mid
227 Billion laughs attack 5,583 186 Start Low
228 Root certificate 5,546 184 Start Mid
229 Lapsus$ 5,496 183 C Low
230 IEEE Symposium on Security and Privacy 5,487 182 Start Mid
231 Weev 5,466 182 C Low
232 Cozy Bear 5,461 182 C Mid
233 Automatic Certificate Management Environment 5,432 181 Start Low
234 Burp Suite 5,431 181 Stub Low
235 Jonathan James 5,427 180 Start Low
236 Chinese wall 5,404 180 C Low
237 Lightning Network 5,403 180 Start Low
238 Attribute-based access control 5,361 178 C Mid
239 Trend Micro 5,347 178 C High
240 Mutual authentication 5,345 178 Stub Low
241 2011 PlayStation Network outage 5,315 177 C Mid
242 LastPass 5,304 176 Start Low
243 CyberArk 5,293 176 C Low
244 Cult of the Dead Cow 5,257 175 C Mid
245 Samsung Knox 5,223 174 Start Mid
246 Obfuscation (software) 5,195 173 C Mid
247 Jeremy Hammond 5,172 172 C Low
248 Electronic voting in the United States 5,140 171 B Mid
249 Clickjacking 5,070 169 B Mid
250 ClamAV 5,051 168 Start Unknown
251 Ungoogled-chromium 5,040 168 Start Low
252 Brain (computer virus) 5,035 167 C Low
253 IDN homograph attack 5,002 166 C Mid
254 Nintendo data leak 4,999 166 C Low
255 List of hacker groups 4,996 166 Start Mid
256 Technical support scam 4,980 166 GA Mid
257 Wiz (company) 4,979 165 Start Low
258 Entrust 4,976 165 Start Unknown
259 Let's Encrypt 4,938 164 B Low
260 Whitelist 4,933 164 Start Low
261 Chaos Computer Club 4,900 163 C Mid
262 John the Ripper 4,896 163 Start Low
263 Network security 4,890 163 Start High
264 Port scanner 4,889 162 B High
265 KeePassXC 4,818 160 Start Low
266 Paywall 4,770 159 C Mid
267 Collision avoidance system 4,735 157 C Mid
268 Credential stuffing 4,731 157 C High
269 Lattice-based cryptography 4,717 157 Start Low
270 Bug bounty program 4,714 157 C High
271 Open banking 4,697 156 C Low
272 Yahoo! data breaches 4,679 155 GA Mid
273 Blaster (computer worm) 4,663 155 Start Low
274 Hacker Manifesto 4,640 154 Start Mid
275 List of cyberattacks 4,613 153 List High
276 Jacob Appelbaum 4,562 152 B Low
277 Off-by-one error 4,561 152 Start Unknown
278 Third-party cookies 4,555 151 C Low
279 CIH (computer virus) 4,529 150 Start Low
280 Digital forensics 4,459 148 GA High
281 Threat model 4,441 148 Start Low
282 Netfilter 4,423 147 C Mid
283 DNS sinkhole 4,416 147 Start Unknown
284 Aubrey Cottle 4,413 147 C Mid
285 Kids Online Safety Act 4,402 146 B Low
286 CalyxOS 4,384 146 C Low
287 Return-oriented programming 4,369 145 C High
288 The Cuckoo's Egg (book) 4,363 145 Start Low
289 Replay attack 4,359 145 C High
290 ActionScript 4,352 145 C Low
291 AVG AntiVirus 4,349 144 Start Low
292 Tiger team 4,327 144 Start Unknown
293 Mydoom 4,315 143 Start Mid
294 The Artifice Girl 4,219 140 Start Low
295 Ron Rivest 4,218 140 Start High
296 Jennifer Arcuri 4,105 136 C Low
297 Non-repudiation 4,031 134 Start Mid
298 Content Security Policy 4,014 133 C High
299 Physical security 4,013 133 C Top
300 Pegasus Project (investigation) 4,008 133 C Low
301 Sandworm (hacker group) 4,000 133 Stub High
302 Offensive Security 3,988 132 C Low
303 Software cracking 3,983 132 Start Mid
304 Mirror site 3,940 131 Start Mid
305 Code Red (computer worm) 3,935 131 Start Low
306 Web of trust 3,901 130 C Low
307 Intel Active Management Technology 3,899 129 C High
308 Information security standards 3,861 128 C Top
309 Operation Olympic Games 3,846 128 Start Mid
310 Proofpoint, Inc. 3,828 127 Start Low
311 Evaluation Assurance Level 3,797 126 Start Low
312 Time-of-check to time-of-use 3,794 126 Start Low
313 Security token 3,785 126 C High
314 List of cybercriminals 3,771 125 List Mid
315 Kevin Poulsen 3,762 125 Start Mid
316 Row hammer 3,728 124 GA Low
317 2007 cyberattacks on Estonia 3,725 124 Start High
318 Fork (blockchain) 3,688 122 Start Low
319 Sean Hastings 3,685 122 Start Low
320 Cold boot attack 3,670 122 C Low
321 MAC spoofing 3,654 121 Start Unknown
322 Code injection 3,649 121 C High
323 Mandatory access control 3,637 121 C High
324 BlackCat (cyber gang) 3,590 119 Start Low
325 Arbitrary code execution 3,585 119 C High
326 Shellshock (software bug) 3,585 119 C High
327 Offensive Security Certified Professional 3,582 119 Start Mid
328 Climatic Research Unit email controversy 3,574 119 B Low
329 Legion of Doom (hacker group) 3,570 119 Start Low
330 Voice phishing 3,563 118 Stub Mid
331 Evil maid attack 3,543 118 C Mid
332 Hector Monsegur 3,514 117 Stub Low
333 Endpoint detection and response 3,500 116 Start Low
334 ISC2 3,477 115 Start Mid
335 Bell–LaPadula model 3,474 115 C Low
336 CryptoLocker 3,450 115 C Mid
337 Nessus (software) 3,442 114 Start Low
338 Endpoint security 3,419 113 Stub Unknown
339 Bruce Schneier 3,390 113 Start High
340 Privacy law 3,377 112 Start High
341 Cyber-security regulation 3,372 112 C High
342 COBIT 3,360 112 Start High
343 Internet security 3,348 111 C High
344 Melissa (computer virus) 3,345 111 Start Unknown
345 Pseudonymization 3,330 111 Start Unknown
346 Common Criteria 3,311 110 Start Low
347 Loyd Blankenship 3,300 110 Stub Low
348 Conti (ransomware) 3,250 108 Start Low
349 Albert Gonzalez 3,249 108 C Mid
350 Comparison of computer viruses 3,237 107 List High
351 Radia Perlman 3,219 107 C Mid
352 ISACA 3,202 106 Start Low
353 Creeper and Reaper 3,186 106 Start Low
354 Timing attack 3,163 105 C Mid
355 DNS spoofing 3,113 103 Start Mid
356 DREAD (risk assessment model) 3,108 103 Start Low
357 AAA (computer security) 3,082 102 Start Low
358 OneTrust 3,075 102 C Low
359 Flame (malware) 3,057 101 C Mid
360 Conficker 3,043 101 B Mid
361 Cyberwarfare by Russia 3,038 101 Start Mid
362 Wickr 3,025 100 C Mid
363 Dangling pointer 3,023 100 C Mid
364 Computer forensics 3,019 100 C High
365 Guccifer 2.0 3,009 100 B Low
366 List of password managers 3,005 100 List Low
367 Daniel J. Bernstein 2,973 99 C Mid
368 Avira 2,969 98 C Low
369 Fail2ban 2,948 98 Start Mid
370 Acceptable use policy 2,916 97 Start Mid
371 Diameter (protocol) 2,903 96 Start Low
372 Dictionary attack 2,899 96 C High
373 Hack Forums 2,885 96 C Low
374 PLA Unit 61398 2,882 96 Start Mid
375 Secure by design 2,881 96 Start High
376 Communications security 2,874 95 Start Mid
377 File inclusion vulnerability 2,867 95 Start Mid
378 F-Secure 2,859 95 Start Mid
379 Forcepoint 2,858 95 Start Unknown
380 Chief information security officer 2,838 94 Start Mid
381 Smurf attack 2,834 94 C Mid
382 DarkSide (hacker group) 2,824 94 Start Low
383 DarkMatter Group 2,812 93 C Low
384 Data security 2,801 93 Start High
385 Certificate Transparency 2,768 92 C High
386 SANS Institute 2,755 91 Start Mid
387 Contingency plan 2,742 91 Start High
388 Kaspersky Anti-Virus 2,734 91 Start Low
389 Office of Personnel Management data breach 2,731 91 C High
390 Chaos Communication Congress 2,720 90 Start Low
391 Application security 2,694 89 Start High
392 Email hacking 2,691 89 Start Mid
393 Coordinated vulnerability disclosure 2,684 89 Stub High
394 Magic Lantern (spyware) 2,677 89 Stub Unknown
395 Snort (software) 2,667 88 Start Mid
396 BeyondTrust 2,663 88 Stub Low
397 Encrypting File System 2,620 87 B Mid
398 Cloud computing security 2,619 87 Start Unknown
399 Tanium 2,615 87 Start Low
400 Memory safety 2,606 86 C Low
401 BleachBit 2,605 86 C Low
402 Qihoo 360 2,589 86 Start Low
403 AACS encryption key controversy 2,585 86 GA Low
404 Confused deputy problem 2,575 85 Start High
405 United States Computer Emergency Readiness Team 2,573 85 Start Low
406 List of cyber warfare forces 2,571 85 Start Low
407 2600: The Hacker Quarterly 2,558 85 Start Mid
408 Drive-by download 2,554 85 Start High
409 Wardialing 2,549 84 Start Unknown
410 Capability-based security 2,527 84 Start High
411 Buffer overflow protection 2,497 83 C Mid
412 Len Sassaman 2,489 82 C Low
413 Java KeyStore 2,480 82 Stub Low
414 Cain and Abel (software) 2,479 82 Start Low
415 Whiz Kids (TV series) 2,478 82 C Low
416 Cyberwarfare by China 2,463 82 C High
417 Discretionary access control 2,460 82 Stub Mid
418 Next-generation firewall 2,459 81 Start Low
419 Security operations center 2,448 81 Start Low
420 List of computer security certifications 2,438 81 List Mid
421 British Library cyberattack 2,431 81 Start Low
422 Van Eck phreaking 2,418 80 C Low
423 Click fraud 2,402 80 Start Low
424 Regulation of self-driving cars 2,402 80 B Mid
425 Symantec Endpoint Protection 2,398 79 GA Low
426 Shellcode 2,395 79 B High
427 Imperva 2,382 79 Start Unknown
428 Cyber spying 2,381 79 Start High
429 Reception and criticism of WhatsApp security and privacy features 2,375 79 C Low
430 Darik's Boot and Nuke 2,360 78 Start Unknown
431 Kill chain (military) 2,355 78 Start Unknown
432 DDoS attacks on Dyn 2,354 78 C Mid
433 2015 Ukraine power grid hack 2,353 78 C Mid
434 Four Horsemen of the Infocalypse 2,326 77 Start Low
435 L0pht 2,319 77 B Mid
436 EC-Council 2,318 77 Start Mid
437 Mermaids (charity) 2,307 76 Start Low
438 FIPS 140 2,300 76 Start Low
439 DDoS mitigation 2,293 76 Start High
440 Security-focused operating system 2,284 76 List Mid
441 Information sensitivity 2,276 75 Start Low
442 New generation warfare 2,273 75 Start Low
443 23andMe data leak 2,271 75 Start Low
444 Resource Public Key Infrastructure 2,258 75 Start Unknown
445 Fake news websites in the United States 2,252 75 B High
446 Secure cookie 2,238 74 Start High
447 Mobile security 2,237 74 C Top
448 Cyber kill chain 2,233 74 Stub Unknown
449 Russian interference in the 2020 United States elections 2,231 74 B Low
450 The Crash (2017 film) 2,198 73 Start Low
451 EPrivacy Directive 2,195 73 C Low
452 Chain of trust 2,185 72 Start Mid
453 Ankit Fadia 2,184 72 Start Low
454 Webroot 2,181 72 Start Low
455 Dynamic application security testing 2,172 72 Start Low
456 Hashcat 2,169 72 C Low
457 Shamoon 2,137 71 Start Mid
458 Cybersecurity Maturity Model Certification 2,131 71 C Low
459 Hacker ethic 2,126 70 C High
460 Shoulder surfing (computer security) 2,118 70 C Low
461 Nulled 2,118 70 Start Unknown
462 Data retention 2,116 70 C Low
463 Cyberwarfare in the United States 2,108 70 Start Mid
464 ATT&CK 2,093 69 Stub Low
465 Data loss prevention software 2,088 69 Start Mid
466 YTCracker 2,079 69 Start Unknown
467 Google Safe Browsing 2,059 68 Start Unknown
468 Opportunistic TLS 2,054 68 Start Mid
469 Ping of death 2,053 68 Start Low
470 Comparison of instant messaging protocols 2,052 68 List Low
471 Zero Days 2,044 68 Start Low
472 United States Army Cyber Command 2,036 67 Stub Low
473 HackingTeam 2,031 67 B Mid
474 Fortify Software 2,028 67 Start Unknown
475 Tsutomu Shimomura 2,021 67 Start Unknown
476 CYREN 2,012 67 B Mid
477 Common Weakness Enumeration 2,003 66 Start Low
478 Computer and network surveillance 1,997 66 C Top
479 Blue Coat Systems 1,997 66 C Low
480 VMware Carbon Black 1,989 66 Start Unknown
481 Blacklist (computing) 1,988 66 Start Mid
482 Security testing 1,987 66 Stub Mid
483 Wiper (malware) 1,980 66 Start Low
484 Roman Seleznev 1,978 65 Start Low
485 System Management Mode 1,964 65 Start High
486 Cellebrite UFED 1,951 65 C Low
487 Cryptovirology 1,948 64 Start Mid
488 BREACH 1,946 64 Start High
489 Dark0de 1,939 64 Start Mid
490 Attack surface 1,928 64 Stub Mid
491 Market for zero-day exploits 1,928 64 C High
492 Dan Kaminsky 1,920 64 B Mid
493 Noname057(16) 1,920 64 C Low
494 List of spyware programs 1,918 63 Start Low
495 Secureworks 1,915 63 Start Unknown
496 Cylance 1,914 63 Start Low
497 FIPS 140-3 1,900 63 C Low
498 AOHell 1,896 63 Start Low
499 Self-XSS 1,896 63 Start Low
500 HBGary 1,895 63 B Mid