20:
292:
203:
227:
186:
247:
334:
322:
474:
469:
129:
123:
117:
112:
107:
102:
97:
464:
404:
86:
81:
76:
71:
66:
56:
51:
46:
41:
36:
445:
271:
305:
200:
8:
224:
183:
428:
159:
25:
275:
231:
251:
190:
207:
458:
368:
440:
416:
392:
344:
19:
170:
This category has the following 5 subcategories, out of 5 total.
268:
380:
339:
310:
291:
The following 15 pages are in this category, out of 15 total.
356:
15:
31:
456:
335:Democratic National Committee cyber attacks
204:Computer companies disestablished in 2015
293:This list may not reflect recent changes
457:
228:Computer-related introductions in 2015
187:Computer companies established in 2015
288:Pages in category "2015 in computing"
248:Programming languages created in 2015
165:
13:
297:
172:
164:
14:
486:
18:
1:
323:Block of Knowledge in Russia
286:
7:
10:
491:
405:Logjam (computer security)
158:For more information, see
157:
446:Trojan.Win32.FireHooker
306:The Algorithm Auction
475:2015 in technology
470:2010s in computing
465:Computing by year
429:Stagefright (bug)
160:2015 in computing
26:Technology portal
482:
277:
270:
253:
233:
226:
209:
202:
192:
185:
151:
146:
141:
136:
28:
23:
22:
490:
489:
485:
484:
483:
481:
480:
479:
455:
454:
453:
452:
451:
450:
433:
421:
409:
397:
385:
373:
361:
349:
327:
315:
285:
284:
283:
282:
279:
278:
267:
258:
255:
254:
238:
235:
234:
223:
214:
211:
210:
199:
194:
193:
182:
163:
162:
156:
155:
154:
149:
144:
139:
134:
92:
91:
24:
17:
12:
11:
5:
488:
478:
477:
472:
467:
449:
448:
443:
437:
434:
432:
431:
425:
422:
420:
419:
413:
410:
408:
407:
401:
398:
396:
395:
389:
386:
384:
383:
377:
374:
372:
371:
365:
362:
360:
359:
353:
350:
348:
347:
342:
337:
331:
328:
326:
325:
319:
316:
314:
313:
308:
302:
299:
298:
289:
281:
280:
266:
265:
262:
259:
257:
256:
246:
245:
242:
239:
237:
236:
222:
221:
218:
215:
213:
212:
198:
197:
195:
181:
180:
177:
174:
173:
168:
153:
152:
147:
142:
137:
132:
127:
120:
115:
110:
105:
100:
94:
93:
90:
89:
84:
79:
74:
69:
64:
59:
54:
49:
44:
39:
33:
32:
30:
29:
9:
6:
4:
3:
2:
487:
476:
473:
471:
468:
466:
463:
462:
460:
447:
444:
442:
439:
438:
435:
430:
427:
426:
423:
418:
415:
414:
411:
406:
403:
402:
399:
394:
391:
390:
387:
382:
379:
378:
375:
370:
367:
366:
363:
358:
355:
354:
351:
346:
343:
341:
338:
336:
333:
332:
329:
324:
321:
320:
317:
312:
309:
307:
304:
303:
300:
296:
294:
287:
273:
272:2015 software
269:
264:
263:
260:
249:
244:
243:
240:
229:
225:
220:
219:
216:
205:
201:
196:
188:
184:
179:
178:
175:
171:
167:Subcategories
166:
161:
148:
143:
138:
133:
131:
128:
126:
125:
121:
119:
116:
114:
111:
109:
106:
104:
101:
99:
96:
95:
88:
85:
83:
80:
78:
75:
73:
70:
68:
65:
63:
60:
58:
55:
53:
50:
48:
45:
43:
40:
38:
35:
34:
27:
21:
16:
290:
276:(5 C, 107 P)
169:
122:
61:
369:Hidden Tear
232:(5 C, 34 P)
208:(1 C, 16 P)
459:Categories
441:TeslaCrypt
191:(2 C, 6 P)
417:Rombertik
393:KeyRaider
345:Duqu 2.0
381:JASBUG
340:Dridex
311:Argon2
357:FREAK
252:(4 P)
150:2060s
145:2050s
140:2040s
135:2030s
130:2020s
124:2010s
118:2000s
113:1990s
108:1980s
103:1970s
98:1960s
87:2020
82:2019
77:2018
72:2017
67:2016
62:2015
57:2014
52:2013
47:2012
42:2011
37:2010
461::
295:.
274:
250:
230:
206:
189:
436:T
424:S
412:R
400:L
388:K
376:J
364:H
352:F
330:D
318:B
301:A
261:S
241:P
217:I
176:C
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.