Awareness and Security is dedicated to cybersecurity education, online privacy, and digital protection. Discover security tips, threat analysis, hacking awareness, account protection methods, and practical guides designed to help users stay safe in the modern digital world.
- Details
- Written by: khalil shreateh
- Category: Awareness and Security
- Hits: 15120
Facebook Account Security
By Khalil Shreateh — Information Security
Are you aware that your account could be at risk?
Many people have had their accounts hacked. If it has happened to you, or you know someone it happened to, you are not alone. From phishing pages that steal your login credentials, to malware files (.exe) distributed through games, chat apps, and social networks — the threats are real and varied.
Be cautious of links sent to you that claim to contain something important. Be especially careful if a link asks you to log in again — check whether the website address is actually facebook.com and not something like (facebook . hosting2 . com).

- Details
- Written by: khalil shreateh
- Category: Awareness and Security
- Hits: 32
The digital landscape has shifted from an era of optional encryption to one where secure origins are the non-negotiable foundation of the web platform. This transition is not merely a cosmetic change or a push for a "green lock" icon in the address bar; it is a fundamental response to the increasing sophistication of man-in-the-middle (MiTM) attacks, data interception, and the rise of powerful web APIs. As we integrate features like Service Workers, Push Notifications, and Geolocation into the fabric of our applications, the surface area for potential exploits expands. Consequently, the browser has evolved from a simple document viewer into a complex security enforcement engine.
Read more: Securing the Modern Web: An In-Depth Look at the Chrome DevTools Security Panel
- Details
- Written by: khalil shreateh
- Category: Awareness and Security
- Hits: 41
A Defender-Oriented Deep Dive into Memory Exploitation and Modern Mitigations
Return-Oriented Programming (ROP) is one of the most sophisticated and enduring code-reuse exploitation techniques in modern cybersecurity. First formalized in academic research in the mid-2000s, ROP enables attackers to execute arbitrary logic on a target system without injecting a single byte of new code. Instead, they chain together small sequences of pre-existing instructions already present in the application's own binary or its linked libraries — making the attack invisible to memory protections that only ask whether a page is executable.
Read more: Return-Oriented Programming: Understanding the Attack to Master the Defense
- Details
- Written by: khalil shreateh
- Category: Awareness and Security
- Hits: 43
A Comprehensive Cybersecurity Awareness Reference Published May 2026 | Security Awareness Series
Introduction: Why Web Application Security Matters
Web applications are the backbone of modern digital life — from banking portals to e-commerce platforms, healthcare records to government services. Yet they remain among the most frequently targeted surfaces in cybersecurity. According to Verizon's Data Breach Investigations Report, web application attacks consistently rank among the top threat vectors year after year.
SQL Injection (SQLi) alone has been listed on the OWASP Top 10 list of critical web application security risks for over two decades. Despite being well-understood and entirely preventable, it continues to power devastating breaches against organizations of all sizes. The reason is straightforward: developers often prioritize functionality over security, and security is retrofitted — if considered at all — only after an incident occurs.
Read more: SQL Injection, Defensive Strategies & OWASP Guidelines
- Details
- Written by: khalil shreateh
- Category: Awareness and Security
- Hits: 38
Why Network Security Demands a Unified Discipline
Network security spans an exceptionally broad range of disciplines — from management philosophy and governance policy to the deepest mechanics of operating system kernels, cryptographic algorithms, and wireless radio transmission. For decades, practitioners seeking comprehensive guidance were forced to assemble that knowledge from dozens of specialized publications, none of which spoke to the full landscape. The "Network Security " addressed that gap by unifying foundational principles, operating system specifics, communications security, threat response, and assessment methodology into a single coherent framework built from the real-world experience of practitioners who had worked at the CIA, Carnegie Mellon, and in senior cybersecurity roles across government and industry.
Read more: Network Security Bible: A Comprehensive Cybersecurity Awareness and Research Guide
- Network and System Security: A Comprehensive Cybersecurity Awareness and Research Guide
- Understanding Error-Based SQL Injection in ASP/ASPX Applications: A Security Awareness Guide
- XSS Protection for Developers: A Complete Guide to Securing Web Applications
- HTML5 Modern Day Attack and Defence Vectors