Skip to content

Asad Ijaz

My Name is Asad Ijaz Khattak and I am the writer and blogger, known for my website "". I have writes about various topics related to technology, networking, and cybersecurity. I am also a Cisco Certified Network Professional (CCNP) and Cisco Certified Network Associate (CCNA). I have written several articles and tutorials on the website which can be used as a learning resource for people interested in networking and cybersecurity. I am the member and Editor of Proudly Team NetworkUstad


  1. Spyware, Adware, and Scareware » Networkustad
    September 13, 2019 @ 4:08 pm

    […] the previous article, I discussed malware, including its type virus, worm, ransomware, trojan horses, logic bomb, back door, and rootkits. In […]


  2. Vishing, Smishing, Pharming, and Whaling » Networkustad
    September 14, 2019 @ 5:17 pm

    […] The whaling attack is trick personal or corporate information through social engineering, email engineering, and content spoofing. The attackers may send an email from trusted sources and some attackers may create a malicious website especially. The attackers also the target’s name; their job titles etc. Whaling attacks usually depend on social engineering. The attackers may send hyperlinks or attachment to infect victims with malware. […]


  3. 10 Things You Probably Didn't Know About Android System Webview
    January 21, 2021 @ 3:41 am

    […] to eliminate an Android System WebView from their devices or not? Although, the app itself is not a malware or suspicious program its existence in the app-list can be befuddling. Android System WebView is a program; designed to […]


  4. Ways To Improve Email Security » NetworkUstad
    May 30, 2021 @ 11:51 pm

    […] you know that more than 90 per cent of cyber attacks on businesses and organizations start with a malicious or phishing email? As a result, businesses relying only on built-in security measures are at a […]


Leave a Reply

%d bloggers like this: