Jump to content

Wikipedia:WikiProject Computer Security/Popular pages

From Wikipedia, the free encyclopedia

This is a list of pages in the scope of Wikipedia:WikiProject Computer Security along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

List

[edit]

Period: 2024-11-01 to 2024-11-30

Total views: 5,355,986

Updated: 21:38, 5 December 2024 (UTC)

Rank Page title Views Daily average Assessment Importance
1 HTTP cookie 248,163 8,272 C High
2 Blockchain 91,703 3,056 B Top
3 Russian interference in the 2016 United States elections 81,549 2,718 B High
4 Swatting 73,006 2,433 C Mid
5 Phishing 72,600 2,420 B High
6 Anonymous (hacker group) 66,093 2,203 GA Mid
7 Electronic voting in India 61,685 2,056 GA High
8 Pegasus (spyware) 59,877 1,995 B Low
9 TamilRockers 47,199 1,573 Start Low
10 Virtual private network 45,425 1,514 C Mid
11 Facebook malware 44,650 1,488 Start Mid
12 Proxy server 42,108 1,403 B High
13 List of Tor onion services 40,614 1,353 List Low
14 Cryptography 40,498 1,349 C Top
15 Reality Winner 38,865 1,295 B Mid
16 Secure Shell 38,737 1,291 C Low
17 WarGames 37,502 1,250 C Low
18 Facebook–Cambridge Analytica data scandal 34,534 1,151 C High
19 Self-driving car 34,181 1,139 B Mid
20 Zero-day vulnerability 33,529 1,117 C High
21 Cloudflare 33,149 1,104 C Low
22 DJI 31,634 1,054 C Low
23 Cybercrime 31,306 1,043 C High
24 Indian WhatsApp lynchings 31,219 1,040 List High
25 Software testing 29,550 985 C Low
26 Russian interference in the 2024 United States elections 29,182 972 C Low
27 Lolita City 29,154 971 Start Low
28 ILOVEYOU 28,993 966 C Mid
29 Multi-factor authentication 28,393 946 C High
30 CrowdStrike 28,004 933 B Mid
31 Kevin Mitnick 26,552 885 C High
32 Malware 26,422 880 C Top
33 Zip bomb 25,317 843 Start Low
34 Google hacking 25,034 834 Start Low
35 Man-in-the-middle attack 24,829 827 C Mid
36 Ashley Madison data breach 22,918 763 Start Mid
37 Cryptographic hash function 22,814 760 C High
38 Kali Linux 22,505 750 Start Mid
39 BIOS 21,511 717 B Mid
40 Hackers (film) 21,490 716 C Low
41 Cross-site request forgery 21,467 715 C High
42 SQL injection 21,306 710 Start High
43 Single sign-on 20,895 696 C High
44 Pretty Good Privacy 20,473 682 B High
45 Electronic voting 20,230 674 C Unknown
46 Phone hacking 20,192 673 Start Mid
47 Adobe Flash 19,761 658 C Low
48 Trusted Platform Module 19,332 644 C High
49 Cross-site scripting 19,190 639 B High
50 Information security 19,175 639 B Top
51 Reverse engineering 19,144 638 C High
52 Ransomware 19,141 638 GA High
53 Keychain (software) 18,927 630 Start Low
54 Palo Alto Networks 18,524 617 C High
55 OAuth 18,296 609 C Mid
56 Social engineering (security) 17,829 594 C High
57 Privacy 17,573 585 C High
58 Electronic voting in the United States 17,130 571 B Mid
59 VirusTotal 17,010 567 Start High
60 Kerberos (protocol) 16,422 547 C High
61 Certificate authority 16,241 541 C High
62 2016 Democratic National Committee email leak 16,008 533 C Mid
63 Trojan horse (computing) 15,924 530 C High
64 Security hacker 15,580 519 C Top
65 Lazarus Group 15,457 515 C Mid
66 Time-based one-time password 15,390 513 C High
67 Salt Typhoon 15,330 511 C Unknown
68 Have I Been Pwned? 15,114 503 Start High
69 White hat (computer security) 15,034 501 Start Low
70 ReCAPTCHA 14,933 497 B Mid
71 Mail and wire fraud 14,675 489 Start Mid
72 Honeypot (computing) 14,424 480 Start High
73 Playpen (website) 14,333 477 Start Low
74 News International phone hacking scandal 14,250 475 C Mid
75 Payment Card Industry Data Security Standard 14,100 470 Start Low
76 Synopsys 14,090 469 B Mid
77 Public key infrastructure 13,906 463 Start High
78 Vault 7 13,824 460 C Unknown
79 Human–computer interaction 13,736 457 C Low
80 EICAR test file 13,733 457 C Low
81 STRIDE model 13,687 456 Start Low
82 End-to-end encryption 13,556 451 C Mid
83 Morris worm 13,456 448 C High
84 Race condition 13,441 448 C Mid
85 Aladdin (BlackRock) 13,351 445 Stub Low
86 Advanced persistent threat 13,226 440 B High
87 Zero trust architecture 13,140 438 C High
88 Risk 12,967 432 C Top
89 2014 Sony Pictures hack 12,913 430 C High
90 NSO Group 12,826 427 B Mid
91 List of the most common passwords 12,687 422 List Unknown
92 List of data breaches 12,566 418 List High
93 Tails (operating system) 12,527 417 Start Mid
94 DMZ (computing) 12,256 408 Start High
95 Startpage.com 12,209 406 C Low
96 Electronic voting by country 12,148 404 C Unknown
97 Authentication 12,066 402 C High
98 SIM swap scam 12,008 400 Start Mid
99 Foreign interference in the 2024 United States elections 11,940 398 C Low
100 Zscaler 11,907 396 Start Low
101 Fortinet 11,834 394 GA Mid
102 Albert Gonzalez 11,813 393 C Mid
103 Federal Information Processing Standards 11,757 391 Start Low
104 Brute-force attack 11,705 390 C High
105 Script kiddie 11,655 388 Start Mid
106 Sneakers (1992 film) 11,557 385 B Low
107 Black hat (computer security) 11,537 384 C Mid
108 Right to privacy 11,448 381 C High
109 Penetration test 11,241 374 C Mid
110 Scammer Payback 11,151 371 Start Mid
111 Data breach 11,147 371 GA Mid
112 Searx 10,934 364 C Unknown
113 Common Vulnerabilities and Exposures 10,877 362 C Top
114 Operation Trojan Shield 10,668 355 C Low
115 Cyberwarfare 10,445 348 C High
116 Role-based access control 10,435 347 C Mid
117 Hybrid warfare 10,104 336 C High
118 Podesta emails 10,089 336 C Low
119 OpenBSD 10,019 333 B High
120 Microsoft Defender Antivirus 9,899 329 C Mid
121 Access control 9,885 329 C High
122 Okta, Inc. 9,831 327 Start Mid
123 Wiz (company) 9,809 326 Start Low
124 Wi-Fi Protected Setup 9,694 323 C Mid
125 Integer overflow 9,618 320 Start Unknown
126 Fake news website 9,559 318 C Low
127 Gary McKinnon 9,477 315 C High
128 Dynamic-link library 9,463 315 C Unknown
129 Hacktivism 9,393 313 C High
130 Voter-verified paper audit trail 9,376 312 C High
131 Spyware 9,218 307 B High
132 CCleaner 9,142 304 C High
133 Phreaking 9,127 304 C Mid
134 Bangladesh Bank robbery 8,906 296 C Low
135 Nmap 8,896 296 C Mid
136 Children's Online Privacy Protection Act 8,759 291 Start Low
137 Hardware security module 8,749 291 Start Mid
138 Identity and access management 8,731 291 C High
139 Climatic Research Unit email controversy 8,731 291 B Low
140 YubiKey 8,676 289 Start Low
141 ChaCha20-Poly1305 8,652 288 C Low
142 Botnet 8,594 286 C High
143 Bitwarden 8,525 284 C Mid
144 Buffer overflow 8,522 284 B High
145 RADIUS 8,449 281 C Mid
146 Software cracking 8,336 277 Start Mid
147 Len Sassaman 8,302 276 C Low
148 Timeline of events associated with Anonymous 8,286 276 C Low
149 Backdoor (computing) 8,231 274 C Mid
150 Intel Management Engine 8,199 273 C High
151 VeraCrypt 8,184 272 C High
152 OpenID 8,133 271 B Low
153 Billion laughs attack 8,127 270 Start Low
154 The Tor Project 8,127 270 C Top
155 Maia arson crimew 8,124 270 GA Low
156 Trellix 8,077 269 B Mid
157 Security-Enhanced Linux 8,036 267 C High
158 Access-control list 8,034 267 Start High
159 Same-origin policy 7,969 265 Start High
160 Cyberspace 7,939 264 C High
161 Electronic Frontier Foundation 7,915 263 C High
162 Red team 7,891 263 GA Low
163 Malwarebytes (software) 7,872 262 C Mid
164 Protection ring 7,849 261 B High
165 Sudo 7,759 258 B Low
166 Keystroke logging 7,749 258 C Low
167 United States Cyber Command 7,737 257 B High
168 Moxie Marlinspike 7,689 256 B Low
169 Lightning Network 7,648 254 Start Low
170 Avast 7,601 253 B Mid
171 OWASP 7,549 251 C Low
172 Common Vulnerability Scoring System 7,545 251 C High
173 Cyber Resilience Act 7,534 251 C Low
174 Fancy Bear 7,450 248 C High
175 Timeline of computer viruses and worms 7,413 247 Start High
176 KeePass 7,283 242 C Mid
177 Password manager 7,162 238 C Mid
178 Jim Browning (YouTuber) 7,109 236 Start Low
179 Xbox Underground 7,094 236 C Low
180 Metasploit 7,068 235 C Mid
181 File-system permissions 7,067 235 C High
182 Chinese interference in the 2024 United States elections 7,062 235 C Low
183 List of warez groups 7,049 234 Start Mid
184 Brain (computer virus) 7,020 234 C Low
185 Sophos 6,987 232 Start Mid
186 SentinelOne 6,984 232 Start Unknown
187 Address space layout randomization 6,977 232 C High
188 SAML 2.0 6,823 227 C Low
189 Log4Shell 6,797 226 C Mid
190 Personal identification number 6,796 226 C High
191 LulzSec 6,787 226 B High
192 Null character 6,721 224 Start Mid
193 Low Orbit Ion Cannon 6,656 221 Start Low
194 Bug bounty program 6,620 220 C High
195 Dahua Technology 6,567 218 B Low
196 NIST Cybersecurity Framework 6,547 218 Start Top
197 Email spoofing 6,515 217 Start Mid
198 1Password 6,489 216 C Low
199 Darktrace 6,486 216 Start Low
200 Yahoo data breaches 6,436 214 GA Mid
201 John the Ripper 6,419 213 Start Low
202 NTLM 6,405 213 C Mid
203 Microsoft Intune 6,400 213 Start Mid
204 CyberArk 6,398 213 C Low
205 Norton AntiVirus 6,384 212 C Mid
206 Bradley Willman 6,374 212 B Low
207 Burp Suite 6,370 212 Stub Low
208 Code injection 6,312 210 C High
209 List of security hacking incidents 6,237 207 List High
210 Certified Information Systems Security Professional 6,210 207 C Mid
211 Kill switch 6,150 205 C Low
212 Business continuity planning 6,059 201 B Mid
213 Web of trust 6,044 201 C Low
214 Patch Tuesday 5,989 199 C Mid
215 Security through obscurity 5,947 198 C Mid
216 SiegedSec 5,946 198 C Low
217 Web cache 5,942 198 Start Low
218 Iranian interference in the 2024 United States elections 5,903 196 C Mid
219 Mutual authentication 5,816 193 Stub Low
220 The Artifice Girl 5,798 193 Start Low
221 Russian interference in the 2020 United States elections 5,788 192 B Low
222 Automatic Certificate Management Environment 5,734 191 Start Low
223 Petya (malware family) 5,712 190 C High
224 2011 PlayStation Network outage 5,709 190 C Mid
225 Adrian Lamo 5,703 190 C High
226 Operation Aurora 5,682 189 C Mid
227 Avast Antivirus 5,679 189 Start Mid
228 Sony BMG copy protection rootkit scandal 5,674 189 B Low
229 CYREN 5,657 188 B Mid
230 Chinese wall 5,655 188 C Low
231 LockBit 5,636 187 C High
232 Mydoom 5,626 187 Start Mid
233 List of hacker groups 5,620 187 Start Mid
234 Weev 5,557 185 C Low
235 Return-oriented programming 5,544 184 C High
236 Jonathan James 5,511 183 Start Low
237 Iptables 5,482 182 Start Mid
238 Paywall 5,481 182 C Mid
239 Lattice-based cryptography 5,465 182 Start Low
240 Cozy Bear 5,389 179 C Mid
241 Let's Encrypt 5,351 178 B Low
242 Lapsus$ 5,350 178 C Low
243 ID.me 5,338 177 Start Low
244 ESET 5,337 177 Start Low
245 Attribute-based access control 5,264 175 C Mid
246 Jay Chaudhry 5,257 175 Stub Low
247 Samsung Knox 5,186 172 Start Mid
248 Collision avoidance system 5,175 172 C Mid
249 SpyEye 5,132 171 Stub Unknown
250 KeePassXC 5,116 170 Start Low
251 Marcus Hutchins 5,039 167 C Mid
252 Object-capability model 5,026 167 Start Mid
253 Whitelist 5,022 167 Start Low
254 Clickjacking 5,014 167 B Mid
255 Obfuscation (software) 4,991 166 C Mid
256 Off-by-one error 4,943 164 Start Unknown
257 DNS sinkhole 4,922 164 Start Unknown
258 Fork (blockchain) 4,888 162 Start Low
259 ActionScript 4,862 162 C Low
260 AVG AntiVirus 4,831 161 Start Low
261 Tiger team 4,827 160 Start Unknown
262 Cult of the Dead Cow 4,787 159 C Mid
263 Reception and criticism of WhatsApp security and privacy features 4,779 159 C Low
264 Root certificate 4,776 159 Start Mid
265 List of cyberattacks 4,765 158 List High
266 Tiny Banker Trojan 4,690 156 C Low
267 Internet leak 4,653 155 C High
268 Chaos Computer Club 4,556 151 C Mid
269 Ron Rivest 4,522 150 Start High
270 ClamAV 4,483 149 Start Unknown
271 Technical support scam 4,442 148 GA Mid
272 Endpoint detection and response 4,403 146 Start Low
273 Network security 4,389 146 Start High
274 Mirror site 4,374 145 Start Mid
275 Credential stuffing 4,369 145 C High
276 List of cybercriminals 4,367 145 List Mid
277 Cyber kill chain 4,357 145 Stub Unknown
278 Chaos Communication Congress 4,318 143 Start Low
279 Nintendo data leak 4,315 143 C Low
280 Ungoogled-chromium 4,298 143 Start Low
281 Vendor 4,294 143 Start Low
282 Van Eck phreaking 4,283 142 C Low
283 Threat model 4,283 142 Start Low
284 Jeremy Hammond 4,278 142 C Low
285 Row hammer 4,272 142 GA Low
286 ISACA 4,205 140 Start Low
287 Replay attack 4,193 139 C High
288 Bruce Schneier 4,180 139 Start High
289 Digital forensics 4,150 138 GA High
290 Intel Active Management Technology 4,126 137 C High
291 Pegasus Project (investigation) 4,115 137 C Low
292 Security token 4,114 137 C High
293 LastPass 4,086 136 Start Low
294 Evaluation Assurance Level 4,039 134 Start Low
295 Electronic voting machine 4,026 134 Start Low
296 Creeper and Reaper 4,022 134 Start Low
297 Certified ethical hacker 4,014 133 Start Low
298 Aubrey Cottle 3,976 132 C Mid
299 Time-of-check to time-of-use 3,964 132 Start Low
300 Bell–LaPadula model 3,945 131 C Low
301 Code Red (computer worm) 3,921 130 Start Low
302 Netfilter 3,886 129 C Mid
303 Mitigation 3,813 127 Start Mid
304 Open banking 3,798 126 C Low
305 COBIT 3,788 126 Start High
306 Memory safety 3,762 125 C Low
307 CalyxOS 3,762 125 C Low
308 Cold boot attack 3,686 122 C Low
309 2017 Ukraine ransomware attacks 3,657 121 C High
310 Content Security Policy 3,631 121 C High
311 Proofpoint, Inc. 3,630 121 Start Low
312 Offensive Security 3,627 120 C Low
313 Offensive Security Certified Professional 3,608 120 Start Mid
314 Nunes memo 3,568 118 B Low
315 Shellshock (software bug) 3,553 118 C High
316 The Cuckoo's Egg (book) 3,500 116 Start Low
317 IDN homograph attack 3,481 116 C Mid
318 Cyberwarfare by Russia 3,462 115 Start Mid
319 Nessus (software) 3,454 115 Start Low
320 Sub7 3,443 114 Start Mid
321 Kevin Poulsen 3,384 112 Start Mid
322 Non-repudiation 3,378 112 Start Mid
323 ISC2 3,372 112 Start Mid
324 Operation Olympic Games 3,365 112 Start Mid
325 Bread Financial 3,359 111 Start Low
326 Timing attack 3,354 111 C Mid
327 Physical security 3,351 111 C Top
328 Dmitri Alperovitch 3,330 111 C Low
329 AACS encryption key controversy 3,302 110 GA Low
330 Daniel J. Bernstein 3,291 109 C Mid
331 Conficker 3,291 109 B Mid
332 BlackCat (cyber gang) 3,291 109 Start Low
333 Chief information security officer 3,273 109 Start Mid
334 Wickr 3,261 108 C Mid
335 Common Criteria 3,238 107 Start Low
336 File inclusion vulnerability 3,229 107 Start Mid
337 Dan Kaminsky 3,197 106 B Mid
338 Melissa (computer virus) 3,194 106 Start Unknown
339 Cain and Abel (software) 3,186 106 Start Low
340 Voice phishing 3,182 106 Stub Mid
341 Internet security 3,181 106 C High
342 Snort (software) 3,130 104 Start Mid
343 IntelBroker 3,129 104 B Low
344 Evil maid attack 3,123 104 C Mid
345 Hashcat 3,119 103 C Low
346 Arbitrary code execution 3,102 103 C High
347 CryptoLocker 3,100 103 C Mid
348 Hector Monsegur 3,064 102 Start Low
349 Cyberwarfare by China 3,059 101 C High
350 Office of Personnel Management data breach 3,041 101 C High
351 Port scanner 3,040 101 B High
352 Pseudonymization 3,023 100 Start Unknown
353 Contingency plan 3,014 100 Start High
354 Gringo: The Dangerous Life of John McAfee 3,011 100 Start Low
355 CIH (computer virus) 3,006 100 Start Low
356 Keeper (password manager) 3,000 100 Start Low
357 Blaster (computer worm) 2,974 99 Start Low
358 Dangling pointer 2,969 98 C Mid
359 2007 cyberattacks on Estonia 2,929 97 Start High
360 List of password managers 2,919 97 List Low
361 23andMe data leak 2,919 97 Start Low
362 Anonymous Sudan 2,905 96 C High
363 Market for zero-day exploits 2,897 96 C High
364 Fail2ban 2,861 95 Start Mid
365 OneTrust 2,844 94 C Low
366 Mandatory access control 2,830 94 C High
367 SANS Institute 2,805 93 Start Mid
368 DREAD (risk assessment model) 2,805 93 Start Low
369 Fake news websites in the United States 2,801 93 B High
370 2015 Ukraine power grid hack 2,795 93 C Mid
371 Cyber-security regulation 2,779 92 C High
372 DarkMatter Group 2,757 91 C Low
373 Certificate Transparency 2,753 91 C High
374 DarkSide (hacker group) 2,753 91 Start Low
375 Agobot 2,739 91 C Mid
376 BeyondTrust 2,734 91 Stub Low
377 Avira 2,732 91 C Low
378 Federated identity 2,727 90 Start High
379 ATT&CK 2,713 90 Stub Low
380 Privacy law 2,704 90 Start High
381 Cybersecurity Maturity Model Certification 2,703 90 C Low
382 Endpoint security 2,681 89 Stub Unknown
383 Buffer overflow protection 2,680 89 C Mid
384 PLA Unit 61398 2,677 89 Start Mid
385 MAC spoofing 2,669 88 Start Unknown
386 Computer forensics 2,643 88 C High
387 Flame (malware) 2,638 87 C Mid
388 Cellebrite UFED 2,628 87 C Low
389 2021 FBI email hack 2,620 87 Start Low
390 Hack Forums 2,607 86 C Low
391 Dictionary attack 2,599 86 C High
392 2600: The Hacker Quarterly 2,598 86 Start Mid
393 Mobile security 2,597 86 C Top
394 Email hacking 2,584 86 Start Mid
395 Next-generation firewall 2,581 86 Start Low
396 Tanium 2,580 86 Start Low
397 Radia Perlman 2,570 85 C Mid
398 Acceptable use policy 2,567 85 Start Mid
399 Forcepoint 2,554 85 Start Unknown
400 DDoS attacks on Dyn 2,545 84 C Mid
401 Guccifer 2.0 2,536 84 B Low
402 Uncomplicated Firewall 2,527 84 Stub Low
403 Diameter (protocol) 2,524 84 Start Low
404 Shellcode 2,503 83 B High
405 Information security standards 2,500 83 C Top
406 Data security 2,495 83 Start High
407 Shamoon 2,485 82 Start Mid
408 Secure by design 2,473 82 Start High
409 EPrivacy Directive 2,470 82 C Low
410 FIPS 140 2,468 82 Start Low
411 Kill chain (military) 2,464 82 Start Unknown
412 Zero Days 2,464 82 Start Low
413 Entrust 2,461 82 Start Unknown
414 Bluesnarfing 2,432 81 Start Low
415 Application security 2,424 80 Start High
416 Wardialing 2,421 80 Start Unknown
417 Third-party cookies 2,420 80 C Low
418 Drive-by download 2,414 80 Start High
419 Team Xecuter 2,401 80 Stub Low
420 British Library cyberattack 2,391 79 Start Low
421 Java KeyStore 2,386 79 Stub Low
422 Goatse Security 2,377 79 Start Low
423 Darik's Boot and Nuke 2,375 79 Start Unknown
424 Trishneet Arora 2,375 79 Start Low
425 Dynamic application security testing 2,371 79 Start Low
426 BleachBit 2,368 78 C Low
427 Authentication, authorization, and accounting 2,341 78 Start Mid
428 Chain of trust 2,323 77 Start Mid
429 Capability-based security 2,309 76 Start High
430 The Crash (2017 film) 2,291 76 Start Low
431 Comparison of computer viruses 2,273 75 List High
432 Hacker Manifesto 2,269 75 Start Mid
433 Cyber threat intelligence 2,269 75 Start Low
434 Ping of death 2,265 75 Start Low
435 ShadowCrew 2,262 75 C Low
436 Evil twin (wireless networks) 2,261 75 Start Mid
437 Anna Kournikova (computer virus) 2,261 75 C Mid
438 FIPS 140-3 2,226 74 C Low
439 New generation warfare 2,221 74 Start Low
440 Communications security 2,209 73 Start Mid
441 Data loss prevention software 2,201 73 Start Mid
442 Security-focused operating system 2,187 72 List Mid
443 HackingTeam 2,176 72 B Mid
444 Mantrap (access control) 2,172 72 Stub Low
445 Pharming 2,156 71 Start Mid
446 Roman Seleznev 2,147 71 Start Low
447 Hacker ethic 2,141 71 C High
448 Blacklist (computing) 2,128 70 Start Mid
449 Microsoft Security Essentials 2,114 70 C Mid
450 Symantec Endpoint Protection 2,104 70 GA Low
451 Shoulder surfing (computer security) 2,103 70 C Low
452 Google Safe Browsing 2,102 70 Start Unknown
453 Confused deputy problem 2,099 69 Start High
454 Conti (ransomware) 2,096 69 Start Low
455 Whiz Kids (TV series) 2,091 69 C Low
456 Common Weakness Enumeration 2,091 69 Start Low
457 Suricata (software) 2,089 69 Start Low
458 Coordinated vulnerability disclosure 2,088 69 Stub High
459 360 Total Security 2,083 69 Start Low
460 Mermaids (charity) 2,083 69 Start Low
461 Trusted timestamping 2,079 69 Start Unknown
462 Comparison of instant messaging protocols 2,066 68 List Low
463 Information sensitivity 2,064 68 Start Low
464 Computer emergency response team 2,057 68 Start High
465 BREACH 2,050 68 Start High
466 List of computer security certifications 2,041 68 List Mid
467 Cyber spying 2,039 67 Start High
468 Noname057(16) 2,031 67 C Low
469 Dr.Web 2,020 67 Start Low
470 Discretionary access control 2,019 67 Start Mid
471 Security operations center 2,005 66 Start Low
472 Blue Coat Systems 1,997 66 C Low
473 Rhysida (hacker group) 1,995 66 Start Low
474 Grayshift 1,994 66 Start Low
475 Virtual machine escape 1,992 66 Start Low
476 SQL Slammer 1,982 66 Start Low
477 Self-XSS 1,977 65 Start Low
478 Computer and network surveillance 1,965 65 C Top
479 CRIME 1,961 65 Start High
480 Scareware 1,955 65 Start Mid
481 Click fraud 1,948 64 C Low
482 Kaspersky and the Russian government 1,942 64 C High
483 Data retention 1,941 64 C Low
484 Opportunistic TLS 1,940 64 Start Mid
485 Jacob Appelbaum 1,940 64 B Low
486 Regulation of self-driving cars 1,929 64 B Mid
487 Secure cookie 1,928 64 Start High
488 NSAKEY 1,924 64 C High
489 Encrypting File System 1,924 64 B Mid
490 Web shell 1,909 63 Start Unknown
491 EC-Council 1,908 63 Start Mid
492 Dark0de 1,907 63 Start Mid
493 Zooko's triangle 1,903 63 Start Low
494 Crypto++ 1,901 63 C Low
495 Pass the hash 1,901 63 C Mid
496 Ankit Fadia 1,898 63 Start Low
497 GhostNet 1,894 63 C Mid
498 Charlie Miller (security researcher) 1,879 62 Start High
499 Brian Krebs 1,862 62 Start Low
500 Cloud computing security 1,853 61 Start Unknown