iWorld
ALTBalaji to tap into international market with YuppTV
MUMBAI: Balaji Telefilms Ltd’s digital venture ALTBalaji has entered into a partnership with YuppTV. Users across the globe will be able to enjoy easy access to ALTBalaji’s premium content on YuppTV platform.
The latest development will allow the diaspora and international audiences to enjoy the big screen experience provided by YuppTV along with convenient access to their favourite shows and movies by ALTBalaji. YuppTV users will also have at their disposal popular movies like Lootera, Love Sex Aur Dhokha, Shor in the City, Shootout at Wadala, Ek Thi Daayan, and more.
“We are glad to partner with ALTBalaji to offer their exclusive premium content to YuppTV users. At YuppTV, it has been our constant endeavour to provide our users with the most entertaining and high-quality content. We are hopeful that our global audience will appreciate the latest addition of ALTBalaji’s content in our bouquet of entertainment services,” YuppTV CEO Uday Reddy said.
ALTBalaji has rolled out 20 original shows in various Indian languages across genres. In addition to this, ALTBalaji also offers entertaining original shows for children and snacky regional stand-up comedy. Yupp TV which has a good reach in diaspora audience can be a helpful platform for ALTBalaji to reach global audience easily.
“ALTBalaji’s original shows have been getting a steady stream of subscribers from the international markets. This alliance allows ALTBalaji to tap into the existing subscriber base of YuppTV and provides easy access to our award winning shows. It is in line with our strategy of being available wherever the audiences are,” ALTBalaji COO Sunil Nair said.
Also Read:
ALTBalaji launches original stand-up comedy in Tamil, Telugu
iWorld
Meta warns 200 users after fake Whatsapp spyware attack
Italy-targeted campaign used unofficial app to deploy surveillance spyware.
MUMBAI: It looked like a message, but it behaved like a mole. Meta has warned around 200 users most of them in Italy after uncovering a targeted spyware campaign that weaponised a fake version of WhatsApp to infiltrate devices. The attack, first reported by Agenzia Nazionale Stampa Associata, relied on classic social engineering with a modern twist: persuading users to download an unofficial WhatsApp clone embedded with surveillance software. The malicious application, believed to be developed by Italian firm SIO through its subsidiary ASIGINT, was designed to mimic the real app closely enough to bypass suspicion.
Meta’s security teams identified roughly 200 individuals who may have installed the compromised version, triggering immediate countermeasures. Affected users were logged out of their accounts and issued alerts warning of potential privacy breaches, with the company describing the incident as a “targeted social engineering attempt” aimed at gaining device-level access.
The malicious app was not distributed via official app stores but circulated through third-party channels, where it was presented as a legitimate WhatsApp alternative. Once installed, it reportedly allowed external operators to access sensitive data stored on the device turning a simple download into a potential surveillance gateway.
According to Techcrunch, Meta is now preparing legal action against the spyware developers to curb further misuse. The company, however, has not disclosed details about the specific individuals targeted or the extent of data compromised.
A Whatsapp spokesperson reiterated that user safety remains the top priority, particularly for those misled into installing the fake iOS application. Meanwhile, reports from La Repubblica suggest the spyware may be linked to “Spyrtacus”, a strain previously associated with Android-based attacks that could intercept calls, activate microphones and even access cameras.
The episode underscores a growing reality in the digital age, the threat is no longer just what you download, but where you download it from. As unofficial apps become increasingly convincing, the line between communication tool and covert surveillance is getting harder to spot and far easier to exploit.






