Jump to content

Wikipedia:WikiProject Computer Security/Popular pages

From Wikipedia, the free encyclopedia

This is a list of pages in the scope of Wikipedia:WikiProject Computer Security along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

List[edit]

Period: 2024-05-01 to 2024-05-31

Total views: 6,985,242

Updated: 00:35, 6 June 2024 (UTC)

Rank Page title Views Daily average Assessment Importance
1 Ashley Madison 589,359 19,011 C Low
2 Ashley Madison data breach 294,376 9,496 Start Mid
3 HTTP cookie 273,623 8,826 C High
4 Facebook malware 117,849 3,801 Start Mid
5 Electronic voting in India 111,123 3,584 B High
6 Phishing 80,564 2,598 B High
7 Pegasus (spyware) 79,042 2,549 B Low
8 TamilRockers 77,444 2,498 Start Low
9 Anonymous (hacker group) 66,087 2,131 GA Mid
10 Blockchain 66,057 2,130 B Top
11 Virtual private network 66,014 2,129 C Mid
12 WhatsApp University 63,200 2,038 Start Low
13 Google hacking 59,439 1,917 Start Low
14 Proxy server 59,220 1,910 C High
15 Extended Copy Protection 58,080 1,873 C Mid
16 Indian WhatsApp lynchings 53,673 1,731 List High
17 List of Tor onion services 48,038 1,549 List Low
18 Reality Winner 46,396 1,496 B Mid
19 WarGames 43,542 1,404 C Low
20 Secure Shell 40,832 1,317 C Low
21 Kevin Mitnick 38,816 1,252 C High
22 Cybercrime 38,596 1,245 C High
23 Cloudflare 38,092 1,228 C Low
24 Self-driving car 35,672 1,150 B Mid
25 ILOVEYOU 33,814 1,090 C Mid
26 Man-in-the-middle attack 30,889 996 C Mid
27 Privacy 30,394 980 C High
28 Multi-factor authentication 29,954 966 C High
29 Facebook–Cambridge Analytica data scandal 29,932 965 C High
30 Palo Alto Networks 29,670 957 C High
31 Lolita City 29,569 953 Start Low
32 Malware 29,061 937 C Top
33 Russian interference in the 2016 United States elections 28,645 924 B High
34 Sony BMG copy protection rootkit scandal 28,257 911 B Low
35 BIOS 27,346 882 B Mid
36 Software testing 26,582 857 C Low
37 DJI 26,378 850 C Low
38 Cryptographic hash function 26,215 845 C High
39 ISO/IEC 27001 26,180 844 Start High
40 Kali Linux 26,161 843 Start Mid
41 Pretty Good Privacy 25,432 820 B High
42 Hackers (film) 25,346 817 C Low
43 Lockbit 24,921 803 C High
44 Swatting 23,964 773 C Mid
45 Zero-day vulnerability 23,624 762 C High
46 McAfee 23,585 760 C High
47 Voter-verified paper audit trail 23,307 751 C High
48 End-to-end encryption 23,080 744 C Mid
49 OAuth 22,837 736 C Mid
50 Trusted Platform Module 22,793 735 C High
51 Cross-site request forgery 22,539 727 C High
52 Cross-site scripting 22,427 723 B High
53 Ransomware 22,292 719 GA High
54 Information security 21,915 706 B Top
55 CrowdStrike 21,170 682 Start Unknown
56 Adobe Flash 20,894 674 C Low
57 Trojan horse (computing) 20,633 665 C High
58 Playpen (website) 19,766 637 Start Low
59 Keychain (software) 19,662 634 Start Low
60 SQL injection 19,648 633 Start High
61 Zero trust security model 19,448 627 C High
62 Certificate authority 19,061 614 C High
63 Public key infrastructure 18,959 611 Start High
64 Social engineering (security) 18,646 601 C High
65 Vault 7 18,587 599 C Unknown
66 Electronic voting 18,460 595 C Unknown
67 Zip bomb 18,349 591 Start Low
68 Security hacker 18,033 581 C Top
69 List of data breaches 17,875 576 List High
70 Reverse engineering 17,593 567 C High
71 Kerberos (protocol) 17,555 566 C High
72 Mail and wire fraud 17,323 558 Start Mid
73 Lazarus Group 17,078 550 C Mid
74 Time-based one-time password 16,581 534 C High
75 Kaspersky Lab 16,241 523 B Mid
76 Race condition 16,100 519 C Mid
77 Data breach 15,802 509 GA Mid
78 2014 Sony Pictures hack 15,768 508 C High
79 Human–computer interaction 15,565 502 C Low
80 Startpage.com 15,063 485 C Low
81 VirusTotal 15,021 484 Start High
82 ReCAPTCHA 14,733 475 B Mid
83 Phone hacking 14,583 470 Start Mid
84 Zscaler 14,572 470 Start Low
85 STRIDE model 14,524 468 Start Low
86 Searx 14,469 466 C Unknown
87 Spyware 14,445 465 B High
88 DMZ (computing) 14,273 460 Start High
89 Aladdin (BlackRock) 14,111 455 Stub Low
90 Payment Card Industry Data Security Standard 13,851 446 Start Low
91 Gen Digital 13,821 445 C High
92 White hat (computer security) 13,727 442 Start Low
93 NSO Group 13,475 434 B Mid
94 Common Vulnerabilities and Exposures 13,424 433 C Top
95 SIM swap scam 13,411 432 Start Mid
96 Authentication 13,406 432 C High
97 AXXo 13,307 429 Start Mid
98 Public key certificate 13,290 428 C High
99 2011 PlayStation Network outage 13,088 422 C Mid
100 News International phone hacking scandal 12,981 418 C Mid
101 Brute-force attack 12,847 414 C High
102 Honeypot (computing) 12,795 412 Start High
103 EICAR test file 12,606 406 C Low
104 Fortinet 12,598 406 GA Mid
105 Cyberwarfare 12,597 406 C High
106 Have I Been Pwned? 12,326 397 Start High
107 Intel Management Engine 11,962 385 C High
108 Role-based access control 11,960 385 C Mid
109 Keeper (password manager) 11,686 376 Start Low
110 Advanced persistent threat 11,666 376 B High
111 Botnet 11,626 375 C High
112 List of the most common passwords 11,334 365 List Unknown
113 OpenBSD 11,306 364 B High
114 Morris worm 11,290 364 C High
115 Right to privacy 11,254 363 C High
116 Protection ring 11,200 361 B High
117 Malwarebytes (software) 11,045 356 C Mid
118 Fancy Bear 11,000 354 C High
119 Sneakers (1992 film) 10,952 353 B Low
120 Timeline of computer viruses and worms 10,872 350 Start High
121 Script kiddie 10,853 350 Start Mid
122 Hardware security module 10,773 347 Start Mid
123 Black hat (computer security) 10,763 347 C Mid
124 Penetration test 10,760 347 C Mid
125 Common Vulnerability Scoring System 10,689 344 C High
126 Microsoft Defender Antivirus 10,646 343 C Mid
127 Nmap 10,569 340 C Mid
128 Intrusion detection system 10,534 339 Start High
129 Red team 10,533 339 GA Low
130 Phreaking 10,526 339 C Mid
131 Security information and event management 10,525 339 Start Mid
132 Tails (operating system) 10,411 335 Start Mid
133 Dynamic-link library 10,398 335 C Unknown
134 Bitdefender 10,346 333 C Mid
135 LulzSec 10,285 331 B High
136 Wi-Fi Protected Setup 10,221 329 C Mid
137 Integer overflow 10,100 325 Start Unknown
138 Dmitri Alperovitch 10,054 324 Start Low
139 Trellix 9,994 322 B Mid
140 Security Assertion Markup Language 9,731 313 C Low
141 Same-origin policy 9,720 313 Start High
142 Timeline of events associated with Anonymous 9,646 311 C Low
143 SAML 2.0 9,559 308 C Low
144 Security-Enhanced Linux 9,542 307 C High
145 Federal Information Processing Standards 9,524 307 Start Low
146 Electronic Frontier Foundation 9,449 304 C High
147 Gary McKinnon 9,433 304 C High
148 Identity management 9,432 304 C High
149 Bitwarden 9,428 304 C Mid
150 Sudo 9,351 301 B Low
151 RADIUS 9,293 299 C Mid
152 Maia arson crimew 9,286 299 GA Low
153 Electronic voting by country 9,204 296 C Unknown
154 ChaCha20-Poly1305 9,067 292 C Low
155 Buffer overflow 8,989 289 B High
156 Tiny Banker Trojan 8,951 288 C Low
157 OpenID 8,917 287 B Low
158 VeraCrypt 8,888 286 C High
159 Avast 8,854 285 B Mid
160 YubiKey 8,793 283 Start Low
161 Cyberspace 8,777 283 C High
162 Keystroke logging 8,774 283 C Low
163 The Tor Project 8,767 282 C Top
164 Certified information systems security professional 8,741 281 C Mid
165 AACS encryption key controversy 8,723 281 GA Low
166 CCleaner 8,722 281 C High
167 United States Cyber Command 8,709 280 B High
168 File-system permissions 8,653 279 C High
169 Access-control list 8,618 278 Start High
170 Bangladesh Bank robbery 8,579 276 C Low
171 Marcus Hutchins 8,557 276 C Mid
172 Low Orbit Ion Cannon 8,491 273 Start Low
173 Exploit (computer security) 8,482 273 Start High
174 Children's Online Privacy Protection Act 8,466 273 Start Low
175 Lightning Network 8,408 271 Start Low
176 Cyber Resilience Act 8,407 271 C Low
177 Metasploit 8,351 269 C Mid
178 Password manager 8,291 267 C Mid
179 Personal identification number 8,139 262 C High
180 Norton AntiVirus 8,110 261 C Mid
181 OWASP 8,091 261 C Low
182 Access control 8,060 260 Start High
183 Hacktivism 8,049 259 C High
184 Security through obscurity 7,878 254 C Mid
185 SpyEye 7,826 252 Stub Unknown
186 Microsoft Intune 7,779 250 Start Mid
187 Kill switch 7,699 248 C Low
188 Dahua Technology 7,647 246 B Low
189 Moxie Marlinspike 7,636 246 B Low
190 Adrian Lamo 7,564 244 C High
191 Certified ethical hacker 7,548 243 Start Low
192 Avast Antivirus 7,515 242 Start Mid
193 Internet leak 7,509 242 C High
194 Email spoofing 7,451 240 Start Mid
195 Backdoor (computing) 7,389 238 C Mid
196 Yahoo! data breaches 7,340 236 GA Mid
197 List of warez groups 7,305 235 Start Mid
198 Petya (malware family) 7,287 235 C High
199 Scammer Payback 7,224 233 Start Mid
200 Null character 7,210 232 Start Mid
201 Web cache 7,178 231 Start Low
202 Hybrid warfare 7,162 231 C High
203 KeePass 7,155 230 C Mid
204 NTLM 7,150 230 C Mid
205 1Password 7,146 230 C Low
206 Wiz (company) 7,116 229 Start Low
207 RSA Conference 7,080 228 Start Mid
208 List of security hacking incidents 7,064 227 List High
209 LastPass 7,042 227 Start Low
210 Operation Trojan Shield 6,946 224 C Low
211 Cozy Bear 6,899 222 C Mid
212 Log4Shell 6,859 221 C Mid
213 SentinelOne 6,842 220 Start Unknown
214 Vulnerability (computing) 6,836 220 Start Top
215 Patch Tuesday 6,826 220 C Mid
216 Weev 6,748 217 C Low
217 Collision avoidance system 6,702 216 C Mid
218 Sophos 6,694 215 Start Mid
219 Electronic voting machine 6,665 215 Start Low
220 Iptables 6,651 214 Start Mid
221 Burp Suite 6,650 214 Stub Low
222 ID.me 6,648 214 Start Low
223 Password cracking 6,550 211 C High
224 Obfuscation (software) 6,484 209 C Mid
225 NIST Cybersecurity Framework 6,466 208 Start Top
226 Address space layout randomization 6,453 208 C High
227 CyberArk 6,406 206 C Low
228 Lapsus$ 6,368 205 C Low
229 Darktrace 6,269 202 Start Low
230 Kids Online Safety Act 6,266 202 B Low
231 Chinese wall 6,181 199 C Low
232 Jonathan James 6,178 199 Start Low
233 Brain (computer virus) 6,169 199 C Low
234 Object-capability model 6,169 199 Start Mid
235 Jay Chaudhry 6,117 197 Stub Low
236 Off-by-one error 6,107 197 Start Unknown
237 Aubrey Cottle 6,072 195 C Mid
238 Root certificate 6,045 195 Start Mid
239 ESET 6,032 194 Start Low
240 2007 cyberattacks on Estonia 5,973 192 Start High
241 Attribute-based access control 5,939 191 C Mid
242 Network security 5,883 189 Start High
243 Mutual authentication 5,831 188 Stub Low
244 Return-oriented programming 5,830 188 C High
245 Whitelist 5,813 187 Start Low
246 Podesta emails 5,807 187 C Low
247 Samsung Knox 5,805 187 Start Mid
248 Operation Aurora 5,690 183 C Mid
249 Ron Rivest 5,649 182 Start High
250 Jennifer Arcuri 5,627 181 C Low
251 Lattice-based cryptography 5,626 181 Start Low
252 Paywall 5,625 181 C Mid
253 BlackCat (cyber gang) 5,625 181 Start Low
254 John the Ripper 5,589 180 Start Low
255 OceanLotus 5,586 180 Stub Low
256 Goatse Security 5,571 179 Start Low
257 List of hacker groups 5,537 178 Start Mid
258 Billion laughs attack 5,458 176 Start Low
259 Threat model 5,454 175 Start Low
260 Privacy law 5,423 174 Start High
261 Let's Encrypt 5,421 174 B Low
262 Jim Browning (YouTuber) 5,419 174 Start Low
263 Bug bounty program 5,406 174 C High
264 Bradley Willman 5,404 174 B Low
265 Clickjacking 5,387 173 B Mid
266 Mydoom 5,360 172 Start Mid
267 KeePassXC 5,328 171 Start Low
268 Technical support scam 5,249 169 GA Mid
269 Jeremy Hammond 5,234 168 C Low
270 Port scanner 5,231 168 B High
271 Trend Micro 5,230 168 C High
272 Pegasus Project (investigation) 5,221 168 C Low
273 Fake news website 5,217 168 C Low
274 Digital forensics 5,204 167 GA High
275 ClamAV 5,174 166 Start Unknown
276 Row hammer 5,170 166 GA Low
277 CIH (computer virus) 5,116 165 Start Low
278 Nintendo data leak 5,063 163 C Low
279 Replay attack 5,060 163 C High
280 Physical security 4,961 160 C Top
281 List of cyberattacks 4,908 158 List High
282 Open banking 4,905 158 C Low
283 Automatic Certificate Management Environment 4,891 157 Start Low
284 Kaspersky bans and allegations of Russian government ties 4,834 155 C High
285 ActionScript 4,830 155 C Low
286 IDN homograph attack 4,807 155 C Mid
287 Credential stuffing 4,781 154 C High
288 AVG AntiVirus 4,778 154 Start Low
289 Cult of the Dead Cow 4,764 153 C Mid
290 Time-of-check to time-of-use 4,739 152 Start Low
291 Code Red (computer worm) 4,713 152 Start Low
292 Ungoogled-chromium 4,707 151 Start Low
293 Internet security 4,698 151 C High
294 Tiger team 4,695 151 Start Unknown
295 Third-party cookies 4,684 151 C Low
296 Information security standards 4,652 150 C Top
297 DNS sinkhole 4,637 149 Start Unknown
298 Blaster (computer worm) 4,636 149 Start Low
299 Operation Olympic Games 4,603 148 Start Mid
300 List of cybercriminals 4,569 147 List Mid
301 Software cracking 4,547 146 Start Mid
302 Offensive Security Certified Professional 4,533 146 Start Mid
303 Chaos Computer Club 4,515 145 C Mid
304 Albert Gonzalez 4,476 144 C Mid
305 Content Security Policy 4,441 143 C High
306 Netfilter 4,438 143 C Mid
307 Creeper and Reaper 4,432 142 Start Low
308 Mirror site 4,421 142 Start Mid
309 CalyxOS 4,420 142 C Low
310 The Cuckoo's Egg (book) 4,372 141 Start Low
311 Conficker 4,358 140 B Mid
312 Offensive Security 4,358 140 C Low
313 Fork (blockchain) 4,333 139 Start Low
314 Intel Active Management Technology 4,318 139 C High
315 Evaluation Assurance Level 4,289 138 Start Low
316 Web of trust 4,268 137 C Low
317 ISC2 4,267 137 Start Mid
318 Radia Perlman 4,237 136 C Mid
319 Hector Monsegur 4,215 135 Stub Low
320 Non-repudiation 4,212 135 Start Mid
321 Endpoint detection and response 4,210 135 Start Low
322 Voice phishing 4,167 134 Stub Mid
323 Proofpoint, Inc. 4,166 134 Start Low
324 Sandworm (hacker group) 4,161 134 Stub High
325 Code injection 4,079 131 C High
326 Bruce Schneier 4,063 131 Start High
327 Bell–LaPadula model 4,061 131 C Low
328 Nessus (software) 4,061 131 Start Low
329 Security token 4,048 130 C High
330 Cold boot attack 4,024 129 C Low
331 COBIT 3,989 128 Start High
332 Office of Personnel Management data breach 3,968 128 C High
333 Arbitrary code execution 3,960 127 Stub High
334 Evil maid attack 3,958 127 C Mid
335 Climatic Research Unit email controversy 3,950 127 B Low
336 MAC spoofing 3,944 127 Start Unknown
337 2017 Ukraine ransomware attacks 3,933 126 C High
338 Hack Forums 3,898 125 C Low
339 Shellshock (software bug) 3,895 125 C High
340 CryptoLocker 3,813 123 C Mid
341 PLA Unit 61398 3,786 122 Start Mid
342 ISACA 3,784 122 Start Low
343 Pseudonymization 3,694 119 Start Unknown
344 Mandatory access control 3,678 118 C High
345 AAA (computer security) 3,644 117 Start Low
346 Computer forensics 3,639 117 C High
347 DarkMatter Group 3,636 117 C Low
348 DREAD (risk assessment model) 3,635 117 Start Low
349 Common Criteria 3,631 117 Start Low
350 Endpoint security 3,569 115 Stub Unknown
351 Dangling pointer 3,565 115 C Mid
352 Security testing 3,562 114 Stub Mid
353 2016 Democratic National Committee email leak 3,539 114 C Mid
354 Electronic voting in the United States 3,538 114 B Mid
355 Cyberwarfare by China 3,527 113 C High
356 Melissa (computer virus) 3,522 113 Start Unknown
357 DNS spoofing 3,518 113 Start Mid
358 Data security 3,511 113 Start High
359 Cyber-security regulation 3,506 113 C High
360 Len Sassaman 3,503 113 C Low
361 Diameter (protocol) 3,486 112 Start Low
362 The Artifice Girl 3,468 111 Start Low
363 OneTrust 3,465 111 C Low
364 Comparison of computer viruses 3,450 111 List High
365 Snort (software) 3,448 111 Start Mid
366 Kevin Poulsen 3,438 110 Start Mid
367 Chief information security officer 3,426 110 Start Mid
368 File inclusion vulnerability 3,422 110 Start Mid
369 Chris Klaus 3,420 110 Stub Low
370 Acceptable use policy 3,411 110 Start Mid
371 Secure by design 3,409 109 Start High
372 List of computer security certifications 3,409 109 List Mid
373 Communications security 3,386 109 Start Mid
374 Daniel J. Bernstein 3,381 109 C Mid
375 Buffer overflow protection 3,347 107 C Mid
376 Zero Days 3,341 107 Start Low
377 DarkSide (hacker group) 3,339 107 Start Low
378 Contingency plan 3,328 107 Start High
379 Timing attack 3,319 107 C Mid
380 Flame (malware) 3,295 106 C Mid
381 Hacker Manifesto 3,282 105 Start Mid
382 Cyberwarfare by Russia 3,265 105 Start Mid
383 Avira 3,263 105 C Low
384 Encrypting File System 3,246 104 B Mid
385 List of password managers 3,215 103 List Low
386 Forcepoint 3,209 103 Start Unknown
387 Shellcode 3,175 102 B High
388 YTCracker 3,162 102 Start Unknown
389 Wickr 3,104 100 C Mid
390 BeyondTrust 3,103 100 Stub Low
391 2600: The Hacker Quarterly 3,097 99 Start Mid
392 Dictionary attack 3,084 99 C High
393 SANS Institute 3,065 98 Start Mid
394 SpySheriff 3,047 98 Start Low
395 Application security 3,034 97 Start High
396 Cybersecurity Maturity Model Certification 3,014 97 C Low
397 Conti (ransomware) 2,999 96 Start Low
398 Imperva 2,992 96 Start Unknown
399 2015 Ukraine power grid hack 2,946 95 C Mid
400 Java KeyStore 2,928 94 Stub Low
401 Van Eck phreaking 2,909 93 C Low
402 Market for zero-day exploits 2,907 93 C High
403 Fail2ban 2,901 93 Start Mid
404 Qihoo 360 2,889 93 Start Low
405 EPrivacy Directive 2,884 93 C Low
406 Symantec Endpoint Protection 2,870 92 GA Low
407 EC-Council 2,846 91 Start Mid
408 Mermaids (charity) 2,834 91 Start Low
409 DDoS attacks on Dyn 2,830 91 C Mid
410 Darik's Boot and Nuke 2,825 91 Start Unknown
411 Nulled 2,820 90 Start Unknown
412 Memory safety 2,810 90 C Low
413 Hashcat 2,805 90 C Low
414 Security operations center 2,783 89 Start Low
415 Information sensitivity 2,770 89 Start Low
416 British Library cyberattack 2,763 89 Start Low
417 Regulation of self-driving cars 2,759 89 B Mid
418 Tanium 2,756 88 Start Low
419 Peiter Zatko 2,751 88 B Mid
420 Capability-based security 2,702 87 Start High
421 Smurf attack 2,696 86 C Mid
422 FIPS 140 2,684 86 Start Low
423 Comparison of instant messaging protocols 2,677 86 List Low
424 F-Secure 2,673 86 Start Mid
425 Shoulder surfing (computer security) 2,664 85 C Low
426 Mobile security 2,660 85 C Top
427 Certificate Transparency 2,656 85 C High
428 Security-focused operating system 2,644 85 List Mid
429 Einstein (US-CERT program) 2,643 85 B Mid
430 Cellebrite UFED 2,624 84 C Low
431 L0pht 2,615 84 B Mid
432 Chaos Communication Congress 2,614 84 Start Low
433 Reception and criticism of WhatsApp security and privacy features 2,602 83 C Low
434 Wardialing 2,583 83 Start Unknown
435 Discretionary access control 2,583 83 Stub Mid
436 Dark0de 2,575 83 Start Mid
437 Drive-by download 2,557 82 Start High
438 Dan Kaminsky 2,534 81 B Mid
439 Shamoon 2,515 81 Start Mid
440 Team Xecuter 2,510 80 Stub Low
441 Coordinated vulnerability disclosure 2,483 80 Stub High
442 Information security audit 2,475 79 Start Low
443 Cain and Abel (software) 2,460 79 Start Low
444 Click fraud 2,449 79 Start Low
445 Email hacking 2,442 78 Start Mid
446 Blacklist (computing) 2,438 78 Start Mid
447 Entrust 2,434 78 Start Unknown
448 NSAKEY 2,415 77 C High
449 Kill chain (military) 2,410 77 Start Unknown
450 Cyber spying 2,403 77 Start High
451 Computer and network surveillance 2,398 77 C Top
452 Data retention 2,393 77 C Low
453 Data loss prevention software 2,389 77 Start Mid
454 FIPS 140-3 2,389 77 C Low
455 Rogue security software 2,370 76 C High
456 DDoS mitigation 2,365 76 Start High
457 Hacker ethic 2,349 75 C High
458 List of cyber warfare forces 2,338 75 Start Low
459 Next-generation firewall 2,336 75 Start Low
460 Protected Extensible Authentication Protocol 2,315 74 C Low
461 Fake news websites in the United States 2,313 74 B High
462 Vx-underground 2,308 74 Stub Low
463 Roman Seleznev 2,307 74 Start Low
464 The Crash (2017 film) 2,306 74 Start Low
465 ISO/IEC 27002 2,291 73 Stub Low
466 Chain of trust 2,285 73 Start Mid
467 Blue Coat Systems 2,284 73 C Low
468 Secure cookie 2,279 73 Start High
469 Self-driving truck 2,275 73 Stub Unknown
470 Attack surface 2,274 73 Stub Mid
471 Webroot 2,269 73 Start Low
472 Confused deputy problem 2,268 73 Start High
473 Ankit Fadia 2,266 73 Start Low
474 Opportunistic TLS 2,258 72 Start Mid
475 Spy pixel 2,255 72 C Low
476 Hardening (computing) 2,254 72 Start Mid
477 VMware Carbon Black 2,241 72 Start Unknown
478 High Orbit Ion Cannon 2,240 72 C Mid
479 Whiz Kids (TV series) 2,239 72 C Low
480 Jacob Appelbaum 2,237 72 B Low
481 Privacy and blockchain 2,237 72 C Low
482 Computer emergency response team 2,236 72 Start High
483 Ping of death 2,235 72 Start Low
484 Cheetah Mobile 2,224 71 C High
485 New generation warfare 2,224 71 Start Low
486 Operation Payback 2,205 71 B Low
487 Threat actor 2,205 71 C Mid
488 Access token 2,204 71 Start Mid
489 Host-based intrusion detection system 2,188 70 Start Low
490 Dynamic application security testing 2,186 70 Start Low
491 Legion of Doom (hacker group) 2,185 70 Start Low
492 ATT&CK 2,166 69 Stub Low
493 System Management Mode 2,161 69 Start High
494 Common Weakness Enumeration 2,153 69 Start Low
495 Wiper (malware) 2,142 69 Start Low
496 HackingTeam 2,134 68 B Mid
497 Tsutomu Shimomura 2,131 68 Start Unknown
498 Secureworks 2,120 68 Start Unknown
499 Session fixation 2,117 68 Start High
500 BREACH 2,106 67 Start High