iWorld
MasterChef India takes the competition a notch higher at Yas Island Abu Dhabi
Mumbai: Sony LIV’s MasterChef India is going international to Yas Island, Abu Dhabi’s leading leisure and entertainment destination. The culinary reality show will be stepping out of the MasterChef Kitchen and taking the home cooks to Yas Island, Abu Dhabi, for fun, frolic and food! The popular cooking reality show has brought together the best home cooks in the country for an exciting challenge that not only tests their culinary skills but also prepares them for world-class cooking.
The contestants will have the opportunity to work closely with local cuisine and learn about various cultural nuances. The contestants will face five challenges on Yas Island, from cooking cultural dishes with the mystery box, to preparing street style dishes and recreating a local sweet in – the MasterChef kitchen. Find out which contestants will move closer to realizing their dream of becoming the next MasterChef India, and who will bid farewell to the show. Don’t miss the excitement, watch the show streaming on Sony LIV at 9 p.m.
MasterChef India’s panel of judges – chef Vikas Khanna, and chef Ranveer Brar are joined by, for the very first time, chef Garima Arora, the first Indian woman to win four Michelin stars.. The judges have been guiding, grilling, and gracefully mentoring each contestant to become India’s MasterChef. The show witnesses’ contestants from across the country battling for the title of MasterChef India.
Miral Destinations CEO Liam Findlay said, “Indian and Middle Eastern cuisines share a profound cultural affinity. We are thrilled to partner with MasterChef India and host the chefs and contestants on Yas Island. India is one of the top source markets for Yas Island and through this partnership we want to not only showcase our award-winning attraction but also connect with the wider Indian audience globally. “
iWorld
Meta warns 200 users after fake Whatsapp spyware attack
Italy-targeted campaign used unofficial app to deploy surveillance spyware.
MUMBAI: It looked like a message, but it behaved like a mole. Meta has warned around 200 users most of them in Italy after uncovering a targeted spyware campaign that weaponised a fake version of WhatsApp to infiltrate devices. The attack, first reported by Agenzia Nazionale Stampa Associata, relied on classic social engineering with a modern twist: persuading users to download an unofficial WhatsApp clone embedded with surveillance software. The malicious application, believed to be developed by Italian firm SIO through its subsidiary ASIGINT, was designed to mimic the real app closely enough to bypass suspicion.
Meta’s security teams identified roughly 200 individuals who may have installed the compromised version, triggering immediate countermeasures. Affected users were logged out of their accounts and issued alerts warning of potential privacy breaches, with the company describing the incident as a “targeted social engineering attempt” aimed at gaining device-level access.
The malicious app was not distributed via official app stores but circulated through third-party channels, where it was presented as a legitimate WhatsApp alternative. Once installed, it reportedly allowed external operators to access sensitive data stored on the device turning a simple download into a potential surveillance gateway.
According to Techcrunch, Meta is now preparing legal action against the spyware developers to curb further misuse. The company, however, has not disclosed details about the specific individuals targeted or the extent of data compromised.
A Whatsapp spokesperson reiterated that user safety remains the top priority, particularly for those misled into installing the fake iOS application. Meanwhile, reports from La Repubblica suggest the spyware may be linked to “Spyrtacus”, a strain previously associated with Android-based attacks that could intercept calls, activate microphones and even access cameras.
The episode underscores a growing reality in the digital age, the threat is no longer just what you download, but where you download it from. As unofficial apps become increasingly convincing, the line between communication tool and covert surveillance is getting harder to spot and far easier to exploit.






