Jump to content
Wikipedia The Free Encyclopedia

Wikipedia:WikiProject Computer security/Popular pages

From Wikipedia, the free encyclopedia

This is a list of pages in the scope of Wikipedia:WikiProject Computer Security along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

List

[edit ]

Period: 2025年11月01日 to 2025年11月30日

Total views: 4,761,955

Updated: 06:56, 7 December 2025 (UTC)

Rank Page title Views Daily average Assessment Importance
1 Cloudflare 300,170 10,005 C Low
2 HTTP cookie 234,703 7,823 C High
3 Proxy server 104,672 3,489 B High
4 Doxing 55,849 1,861 C Low
5 Pegasus (spyware) 54,214 1,807 B Low
6 WarGames 50,655 1,688 C Low
7 Blockchain 50,596 1,686 B Top
8 TamilRockers 49,893 1,663 Start Low
9 Phishing 49,088 1,636 B High
10 Secure Shell 40,474 1,349 C High
11 Anonymous (hacker group) 40,267 1,342 GA Mid
12 UEFI 38,193 1,273 B Unknown
13 Virtual private network 37,753 1,258 C Mid
14 Electronic voting in India 37,225 1,240 GA High
15 Reality Winner 35,873 1,195 B Mid
16 News International phone hacking scandal 31,028 1,034 C Mid
17 Cryptography 30,825 1,027 C Top
18 ILOVEYOU 29,624 987 C Mid
19 Have I Been Pwned? 27,702 923 Start High
20 Vault 7 27,320 910 C Unknown
21 Kevin Mitnick 26,968 898 C High
22 DJI 26,704 890 C Low
23 Facebook–Cambridge Analytica data scandal 26,346 878 C High
24 List of Tor onion services 23,996 799 List Low
25 Russian interference in the 2016 United States elections 23,904 796 B High
26 Hackers (film) 23,006 766 C Low
27 CrowdStrike 22,268 742 B Mid
28 Google hacking 22,223 740 Start Low
29 Multi-factor authentication 21,504 716 C High
30 Sneakers (1992 film) 21,159 705 B Low
31 Cybercrime 20,671 689 C High
32 Man-in-the-middle attack 19,836 661 C Mid
33 Trusted Platform Module 19,541 651 C High
34 Malware 19,466 648 C Top
35 SQL injection 19,228 640 Start High
36 Zero-day vulnerability 19,055 635 C High
37 Cross-site request forgery 18,734 624 C High
38 Adobe Flash 18,575 619 C Low
39 VirusTotal 18,540 618 Start High
40 BIOS 18,437 614 B Mid
41 Swatting 17,738 591 C Mid
42 Lazarus Group 17,672 589 C Mid
43 Privacy 17,041 568 C High
44 Pretty Good Privacy 16,765 558 B High
45 Cross-site scripting 16,691 556 B High
46 Kali Linux 16,679 555 Start Mid
47 List of the most common passwords 16,401 546 List Low
48 Cryptographic hash function 16,187 539 C High
49 Palo Alto Networks 15,429 514 C High
50 Ransomware 15,343 511 GA High
51 Morris worm 15,025 500 C High
52 Intel Management Engine 15,020 500 C High
53 Bitwarden 14,944 498 C Mid
54 Startpage 14,282 476 C Low
55 Jaguar Land Rover cyberattack 14,255 475 Start Unknown
56 Mail and wire fraud 13,918 463 Start Mid
57 Software testing 13,616 453 C Low
58 White hat (computer security) 13,506 450 Start Low
59 Single sign-on 13,483 449 C High
60 1Password 13,362 445 C Low
61 Password manager 13,255 441 C Mid
62 Advanced persistent threat 13,249 441 B High
63 Reverse engineering 13,216 440 C High
64 Certificate authority 13,088 436 C High
65 Social engineering (security) 13,080 436 C High
66 OAuth 13,055 435 C Mid
67 Payment Card Industry Data Security Standard 13,028 434 Start Low
68 EICAR test file 12,942 431 C Low
69 Jonathan James 12,934 431 Start Low
70 Aladdin (BlackRock) 12,493 416 Start Low
71 NSO Group 12,441 414 B Mid
72 2014 Sony Pictures hack 12,376 412 C High
73 Lolita City 12,221 407 Start Low
74 Time-based one-time password 12,052 401 C High
75 Information security 11,963 398 B Top
76 Gary McKinnon 11,960 398 C High
77 Kerberos (protocol) 11,929 397 C High
78 Trojan horse (computing) 11,913 397 C High
79 ReCAPTCHA 11,840 394 B Mid
80 Fortinet 11,759 391 C Mid
81 Synopsys 11,404 380 B Mid
82 Tails (operating system) 11,175 372 Start Mid
83 OpenBSD 11,119 370 B High
84 STRIDE model 10,959 365 Start Low
85 Automatic Certificate Management Environment 10,745 358 Start Low
86 Race condition 10,676 355 C Mid
87 Zip bomb 10,315 343 Start Low
88 Sudo 10,229 340 B Low
89 Wiz, Inc. 10,156 338 Start Low
90 Security hacker 10,155 338 C Top
91 Robert Tappan Morris 10,149 338 Start Mid
92 Brute-force attack 10,095 336 C High
93 Botnet 9,986 332 C High
94 Nmap 9,945 331 C Mid
95 YubiKey 9,870 329 Start Low
96 Okta, Inc. 9,706 323 Start Mid
97 Public key infrastructure 9,612 320 C High
98 VeraCrypt 9,572 319 C High
99 Scammer Payback 9,461 315 Start Mid
100 Log4Shell 9,403 313 C Mid
101 KeePass 9,389 312 C Mid
102 Operation Trojan Shield 9,227 307 C Low
103 Human–computer interaction 9,212 307 C Low
104 Phreaking 9,086 302 C Mid
105 List of data breaches 9,034 301 List High
106 Timeline of computer viruses and worms 9,030 301 Start High
107 Integer overflow 8,879 295 Start Unknown
108 Electronic Frontier Foundation 8,717 290 C High
109 Phone hacking 8,715 290 Start Mid
110 End-to-end encryption 8,603 286 C Mid
111 Same-origin policy 8,368 278 Start High
112 Salt Typhoon 8,345 278 C Unknown
113 Playpen (website) 8,328 277 Start Low
114 Ashley Madison data breach 8,247 274 Start Mid
115 Fancy Bear 8,206 273 C High
116 Risk 8,186 272 C Top
117 ChaCha20-Poly1305 8,080 269 C Low
118 Authentication 8,069 268 C High
119 Data breach 8,062 268 GA Mid
120 Petya (malware family) 8,010 267 C High
121 Honeypot (computing) 7,996 266 Start High
122 Role-based access control 7,961 265 C Mid
123 The Artifice Girl 7,958 265 Start Low
124 Security-Enhanced Linux 7,948 264 C High
125 Jim Browning (YouTuber) 7,917 263 Start Low
126 Children's Online Privacy Protection Act 7,902 263 Start Low
127 DMZ (computing) 7,869 262 C High
128 Common Vulnerabilities and Exposures 7,857 261 C Top
129 Sophos 7,840 261 Start Mid
130 Voter-verified paper audit trail 7,763 258 C High
131 Zscaler 7,744 258 Start Low
132 Script kiddie 7,731 257 Start Mid
133 Penetration test 7,510 250 C Mid
134 Spyware 7,498 249 B High
135 Lightning Network 7,460 248 Start Low
136 Podesta emails 7,358 245 C Low
137 Jay Chaudhry 7,314 243 Stub Low
138 CCleaner 7,191 239 C High
139 Protection ring 7,089 236 B High
140 Radia Perlman 7,089 236 C Mid
141 Microsoft Defender Antivirus 7,028 234 C Mid
142 Identity and access management 6,880 229 C High
143 Mydoom 6,868 228 Start Mid
144 Hardware security module 6,854 228 Start Mid
145 Federal Information Processing Standards 6,823 227 Start Low
146 Searx 6,804 226 C Unknown
147 United States Cyber Command 6,764 225 B High
148 Malwarebytes (software) 6,756 225 C Mid
149 Moxie Marlinspike 6,684 222 B Low
150 Dynamic-link library 6,673 222 C Unknown
151 Right to privacy 6,633 221 C High
152 SIM swap scam 6,632 221 Start Mid
153 Hacktivism 6,619 220 C High
154 Bangladesh Bank robbery 6,567 218 C Low
155 The Tor Project 6,553 218 C Top
156 Buffer overflow 6,525 217 B High
157 Software cracking 6,473 215 Start Mid
158 List of warez groups 6,454 215 Start Mid
159 Clickjacking 6,426 214 B Mid
160 OWASP 6,413 213 C Low
161 Wi-Fi Protected Setup 6,393 213 C Mid
162 The Cuckoo's Egg (book) 6,384 212 Start Low
163 Internet leak 6,374 212 C High
164 Low Orbit Ion Cannon 6,262 208 Start Low
165 Cyberwarfare 6,239 207 C High
166 Let's Encrypt 6,235 207 B Low
167 Red team 6,230 207 GA Low
168 Maia arson crimew 6,131 204 GA Low
169 Len Sassaman 6,069 202 C Low
170 Daniel J. Bernstein 6,055 201 C Mid
171 New generation warfare 6,021 200 C Low
172 KeePassXC 5,995 199 Start Low
173 List of security hacking incidents 5,992 199 List High
174 Backdoor (computing) 5,910 197 C Mid
175 CyberArk 5,882 196 C Low
176 Lapsus$ 5,836 194 C Low
177 Black hat (computer security) 5,819 193 C Mid
178 OpenID 5,787 192 B Low
179 Keychain (software) 5,784 192 Start Low
180 Marcus Hutchins 5,784 192 B Mid
181 Kill switch 5,751 191 C Low
182 LulzSec 5,708 190 B High
183 Electronic voting by country 5,705 190 B Low
184 Common Vulnerability Scoring System 5,701 190 C High
185 RADIUS 5,640 188 C Mid
186 Markus Hess 5,628 187 Start Low
187 Keystroke logging 5,621 187 C Low
188 ID.me 5,553 185 Start Low
189 Address space layout randomization 5,552 185 C High
190 Metasploit 5,542 184 C Mid
191 Cyber Resilience Act 5,498 183 C Low
192 Time-of-check to time-of-use 5,461 182 Start Low
193 Hybrid warfare 5,453 181 C High
194 Albert Gonzalez 5,438 181 C Mid
195 John the Ripper 5,436 181 Start Low
196 Off-by-one error 5,395 179 Start Unknown
197 ClamAV 5,376 179 C Low
198 Electronic voting 5,346 178 C Unknown
199 Cyberspace 5,233 174 C High
200 Security through obscurity 5,186 172 C Mid
201 Weev 5,160 172 C Low
202 SentinelOne 5,159 171 Start Unknown
203 Sony BMG copy protection rootkit scandal 5,158 171 B Low
204 Avast Antivirus 5,158 171 Start Mid
205 Access control 5,133 171 C High
206 Burp Suite 5,132 171 Start Low
207 Adrian Lamo 5,092 169 C High
208 Ungoogled-chromium 5,065 168 Start Low
209 Microsoft Intune 4,996 166 Start Mid
210 Nintendo data leak 4,980 166 C Low
211 DNS sinkhole 4,949 164 Start Unknown
212 IDN homograph attack 4,894 163 C Mid
213 2016 Democratic National Committee email leak 4,894 163 C Mid
214 2017 Ukraine ransomware attacks 4,875 162 C High
215 Trellix 4,867 162 B Mid
216 Lattice-based cryptography 4,842 161 Start Low
217 Avast 4,839 161 B Mid
218 List of hacker groups 4,818 160 List Mid
219 Row hammer 4,809 160 GA Low
220 Chaos Computer Club 4,758 158 C Mid
221 Access-control list 4,724 157 Start High
222 Scareware 4,711 157 Start Mid
223 The Password Game 4,673 155 GA Low
224 File-system permissions 4,647 154 C High
225 Chaos Communication Congress 4,631 154 Start Low
226 NIST Cybersecurity Framework 4,582 152 Start Top
227 Mutual authentication 4,568 152 Stub Low
228 Ron Rivest 4,522 150 Start High
229 Personal identification number 4,456 148 C High
230 Return-oriented programming 4,424 147 C High
231 LastPass 4,411 147 Start Low
232 Darktrace 4,338 144 Start Low
233 Email spoofing 4,331 144 Start Mid
234 Tavis Ormandy 4,312 143 Stub Mid
235 Credential stuffing 4,274 142 C High
236 Cozy Bear 4,264 142 C Mid
237 Dahua Technology 4,255 141 B Low
238 LockBit 4,237 141 C High
239 Attribute-based access control 4,226 140 C Mid
240 Tiger team 4,221 140 Start Unknown
241 SAML 2.0 4,206 140 C Low
242 Timeline of events associated with Anonymous 4,183 139 C Low
243 Patch Tuesday 4,152 138 C Mid
244 Null character 4,132 137 Start Mid
245 Clop (hacker group) 4,124 137 Start Low
246 NTLM 4,113 137 C Mid
247 Content Security Policy 4,106 136 C High
248 Tiny Banker Trojan 4,105 136 C Low
249 Akira (ransomware) 4,090 136 Stub Low
250 2011 PlayStation Network outage 4,088 136 C Mid
251 Bug bounty program 4,055 135 C High
252 Pegasus Project (investigation) 4,022 134 C Low
253 Brain (computer virus) 3,998 133 Start Low
254 Yahoo data breaches 3,991 133 GA Mid
255 Certified Information Systems Security Professional 3,988 132 C Mid
256 ESET 3,969 132 Start Low
257 Xbox Underground 3,964 132 C Low
258 Whitelist 3,948 131 Start Low
259 Bruce Schneier 3,936 131 Start High
260 Samsung Knox 3,884 129 Start Mid
261 CalyxOS 3,831 127 C Low
262 Replay attack 3,799 126 C High
263 Norton AntiVirus 3,783 126 C Mid
264 Web cache 3,768 125 Start Low
265 Object-capability model 3,751 125 Start Mid
266 Paywall 3,743 124 C Mid
267 Creeper and Reaper 3,698 123 Start Low
268 DarkMatter Group 3,688 122 C Low
269 Business continuity planning 3,681 122 B Mid
270 Cult of the Dead Cow 3,663 122 C Mid
271 Obfuscation (software) 3,624 120 C Mid
272 NSAKEY 3,581 119 C High
273 ActionScript 3,568 118 C Low
274 Iptables 3,560 118 C Mid
275 23andMe data leak 3,532 117 Start Low
276 SpyEye 3,496 116 Stub Unknown
277 Code injection 3,489 116 C High
278 Timing attack 3,484 116 C Mid
279 Mark of the Web 3,484 116 Start Low
280 Collision avoidance system 3,474 115 C Mid
281 List of cybercriminals 3,468 115 List Mid
282 Code Red (computer worm) 3,412 113 Start Low
283 Fake news website 3,393 113 C Low
284 File inclusion vulnerability 3,392 113 Start Mid
285 Mirror site 3,384 112 C Mid
286 CYREN 3,378 112 B Mid
287 ZoneAlarm 3,370 112 Start Mid
288 Conficker 3,358 111 B Mid
289 Cold boot attack 3,355 111 C Low
290 Nunes memo 3,354 111 B Low
291 Chief information security officer 3,350 111 C Mid
292 Chinese wall 3,337 111 C Low
293 Coordinated vulnerability disclosure 3,319 110 Stub High
294 List of cyberattacks 3,318 110 List High
295 List of password managers 3,293 109 List High
296 DDoS mitigation 3,287 109 Start High
297 Operation Aurora 3,263 108 C Mid
298 Threat model 3,258 108 Start Low
299 ISACA 3,238 107 Start Low
300 Karl Koch (hacker) 3,225 107 Start Low
301 Web of trust 3,221 107 C Low
302 Fork (blockchain) 3,160 105 Start Low
303 Digital forensics 3,154 105 GA High
304 Dmitri Alperovitch 3,112 103 C Low
305 Offensive Security Certified Professional 3,104 103 Start Mid
306 Root certificate 3,076 102 Start Mid
307 SiegedSec 3,067 102 C Low
308 Climatic Research Unit email controversy 3,048 101 B Low
309 Cheetah Mobile 3,030 101 C High
310 COBIT 3,016 100 Start High
311 Hacktivismo 3,012 100 Start Low
312 Roger Dingledine 2,999 99 Start Unknown
313 Port scanner 2,994 99 B High
314 Cyber kill chain 2,985 99 Start Mid
315 Proofpoint 2,976 99 Start Low
316 Arbitrary code execution 2,970 99 C High
317 Shellshock (software bug) 2,968 98 C High
318 Intel Active Management Technology 2,955 98 C High
319 Avira 2,950 98 C Low
320 Mandatory access control 2,934 97 C High
321 OneTrust 2,931 97 C Low
322 Vendor 2,917 97 Start Low
323 AACS encryption key controversy 2,903 96 GA Low
324 Evil maid attack 2,877 95 C Mid
325 Noname057(16) 2,874 95 C Low
326 Cyberwarfare by Russia 2,860 95 B High
327 Bread Financial 2,852 95 Start Low
328 Melissa (computer virus) 2,844 94 Start Unknown
329 Blaster (computer worm) 2,831 94 Start Low
330 DDoS attacks on Dyn 2,803 93 C Mid
331 AVG AntiVirus 2,798 93 Start Low
332 Technical support scam 2,788 92 GA Mid
333 Certificate Transparency 2,769 92 C High
334 EPrivacy Directive 2,736 91 C Low
335 Dan Kaminsky 2,728 90 B Mid
336 Kill chain (military) 2,722 90 Start Unknown
337 Electronic voting in the United States 2,714 90 B Mid
338 CIH (computer virus) 2,708 90 Start Low
339 Fail2ban 2,698 89 Start Mid
340 Security token 2,678 89 C High
341 Endpoint detection and response 2,678 89 Start Low
342 2015 Ukraine power grid hack 2,675 89 C Mid
343 Briar (software) 2,668 88 Start Low
344 Confused deputy problem 2,663 88 Start High
345 Evaluation Assurance Level 2,660 88 Start Low
346 Hector Monsegur 2,655 88 Start Low
347 Memory safety 2,640 88 C Low
348 ISC2 2,636 87 Start Mid
349 Capability-based security 2,622 87 Start High
350 Operation Olympic Games 2,619 87 Start Mid
351 Jabber Zeus 2,618 87 B Low
352 Jacob Appelbaum 2,602 86 B Low
353 PLA Unit 61398 2,601 86 Start Mid
354 Third-party cookies 2,598 86 C Low
355 CryptoLocker 2,597 86 C Mid
356 Office of Personnel Management data breach 2,579 85 C High
357 Cellebrite UFED 2,575 85 C Low
358 2600: The Hacker Quarterly 2,563 85 Start Mid
359 List of security-focused operating systems 2,536 84 List Mid
360 Offensive Security 2,513 83 C Low
361 Network security 2,507 83 Start High
362 Wardialing 2,506 83 Start Unknown
363 Bell–LaPadula model 2,484 82 C Low
364 Non-repudiation 2,479 82 Start Mid
365 Kevin Poulsen 2,469 82 Start Mid
366 BlackCat (cyber gang) 2,459 81 Start Low
367 Hacker Manifesto 2,456 81 Start Mid
368 Dictionary attack 2,444 81 C High
369 Nessus (software) 2,437 81 Start Low
370 Jeremy Hammond 2,398 79 C Low
371 Fake news websites in the United States 2,383 79 B High
372 Cyberwarfare and China 2,367 78 C High
373 Jennifer Arcuri 2,367 78 C Low
374 Snowflake data breach 2,361 78 C Low
375 Goatse Security 2,338 77 Start Low
376 HBGary 2,334 77 B Mid
377 Common Criteria 2,319 77 Start Low
378 Van Eck phreaking 2,315 77 C Low
379 Wickr 2,305 76 C Mid
380 Trishneet Arora 2,293 76 Start Low
381 Physical security 2,290 76 C Top
382 Dr.Web 2,287 76 Start Low
383 BeyondTrust 2,262 75 Start Low
384 Russian interference in the 2024 United States elections 2,246 74 C Low
385 Kaspersky and the Russian government 2,245 74 C High
386 Security.txt 2,241 74 Start Low
387 DarkSide (hacker group) 2,239 74 Start Low
388 Ankit Fadia 2,232 74 Start Low
389 Contingency plan 2,232 74 Start High
390 Flame (malware) 2,226 74 C Mid
391 ATT&CK 2,206 73 Stub Low
392 HackingTeam 2,184 72 B Mid
393 GhostNet 2,158 71 C Mid
394 ShadowCrew 2,157 71 C Low
395 Orbot 2,155 71 Stub Low
396 2007 cyberattacks on Estonia 2,153 71 Start High
397 Cain and Abel (software) 2,146 71 Start Low
398 Attack surface 2,145 71 Stub Mid
399 Forcepoint 2,142 71 Start Unknown
400 Secure by design 2,135 71 Start High
401 List of spyware programs 2,134 71 Start Low
402 Tanium 2,132 71 Start Low
403 Hack Forums 2,131 71 C Low
404 Evil twin (wireless networks) 2,125 70 Start Mid
405 FIPS 140-3 2,098 69 C Low
406 BleachBit 2,097 69 C Low
407 British Library cyberattack 2,091 69 Start Low
408 Shoulder surfing (computer security) 2,086 69 C Low
409 MAC spoofing 2,085 69 Start Unknown
410 Trust on first use 2,073 69 Start Low
411 Troy Hunt 2,065 68 Start Low
412 Mermaids (charity) 2,063 68 Start Low
413 HackThisSite 2,055 68 C Low
414 Reception and criticism of WhatsApp security and privacy features 2,054 68 C Low
415 Pseudonymization 2,053 68 Start Unknown
416 Hacker ethic 2,049 68 C High
417 Open banking 2,044 68 C Low
418 Snort (software) 2,039 67 Start Mid
419 Zero Days 2,028 67 Start Low
420 Conti (ransomware) 2,011 67 Start Low
421 FIPS 140 1,997 66 Start Low
422 DREAD (risk assessment model) 1,993 66 Start Low
423 Gameover ZeuS 1,989 66 GA Mid
424 Cryptomator 1,989 66 C Unknown
425 Infostealer 1,984 66 B Low
426 Privacy law 1,978 65 Start High
427 Federated identity 1,972 65 Start High
428 Brian Krebs 1,971 65 Start Low
429 Nadim Kobeissi 1,971 65 C Mid
430 2024 National Public Data breach 1,968 65 Start Low
431 Buffer overflow protection 1,962 65 C Mid
432 Whiz Kids (TV series) 1,960 65 C Low
433 Data loss prevention software 1,951 65 Start Mid
434 Voice phishing 1,950 65 Stub Mid
435 Hashcat 1,938 64 C Low
436 Electronic voting machine 1,937 64 Start Low
437 Dangling pointer 1,929 64 C Mid
438 Mitigation 1,923 64 Start Mid
439 Drive-by download 1,921 64 Start High
440 PrivadoVPN 1,917 63 Start Low
441 Next-generation firewall 1,915 63 Start Low
442 Shamoon 1,914 63 Start Mid
443 IntelBroker 1,911 63 B Low
444 Communications security 1,898 63 Start Mid
445 Shellcode 1,895 63 B High
446 Authentication, authorization, and accounting 1,886 62 Start Mid
447 Google Safe Browsing 1,882 62 Start Unknown
448 SANS Institute 1,879 62 Start Mid
449 CRIME 1,873 62 Start High
450 ISO/IEC 27002 1,872 62 Start Low
451 Cyber-security regulation 1,867 62 C High
452 Self-XSS 1,866 62 Start Low
453 Entrust 1,857 61 Start Unknown
454 The Crash (2017 film) 1,849 61 Start Low
455 Aubrey Cottle 1,848 61 C Mid
456 Certified ethical hacker 1,829 60 Start Low
457 Keeper (password manager) 1,825 60 Start Low
458 UGNazi 1,824 60 Start Low
459 Dynamic application security testing 1,822 60 Start Low
460 Opportunistic TLS 1,820 60 Start Mid
461 Diameter (protocol) 1,802 60 Start Low
462 Rhysida (hacker group) 1,796 59 Start Low
463 Suricata (software) 1,779 59 Start Low
464 Darik's Boot and Nuke 1,778 59 Start Unknown
465 System Management Mode 1,756 58 Start High
466 360 Total Security 1,749 58 Start Low
467 Microsoft Security Essentials 1,742 58 C Mid
468 Click fraud 1,737 57 C Low
469 Phrack 1,735 57 C Mid
470 Fufufafa 1,728 57 C Unknown
471 Comparison of instant messaging protocols 1,715 57 List Low
472 Bureau 121 1,711 57 C Low
473 Anna Kournikova (computer virus) 1,704 56 C Mid
474 Kane Gamble 1,704 56 Start Low
475 Tsutomu Shimomura 1,697 56 Start Unknown
476 FinFisher 1,680 56 C High
477 Stagefright (bug) 1,680 56 C Mid
478 United States Army Cyber Command 1,676 55 Stub Low
479 Computer forensics 1,673 55 C High
480 Collins Aerospace cyberattack 1,671 55 Unknown Unknown
481 Application security 1,670 55 Start High
482 Arctic Wolf Networks 1,670 55 Stub Unknown
483 Slopsquatting 1,670 55 C Low
484 Ping of death 1,668 55 Start Low
485 Team Xecuter 1,665 55 Start Low
486 Internet security 1,662 55 C High
487 Nulled 1,660 55 Start Unknown
488 FORCEDENTRY 1,660 55 Start Low
489 Cloud computing security 1,657 55 Start Unknown
490 Netcraft 1,655 55 Start Low
491 Virtual machine escape 1,646 54 Start Low
492 List of cyber warfare forces 1,641 54 Start Low
493 Data retention 1,626 54 C Low
494 SQL Slammer 1,605 53 Start Low
495 Roman Seleznev 1,605 53 Start Low
496 Mantrap (access control) 1,599 53 Stub Low
497 Computer emergency response team 1,595 53 Start High
498 Secure cryptoprocessor 1,593 53 C Mid
499 Dark0de 1,591 53 Start Mid
500 Computer Misuse Act 1990 1,583 52 C Low

AltStyle によって変換されたページ (->オリジナル) /