iWorld
Brands engage with Twitter influencers to reach out
MUMBAI: According to the Internet and Mobile Association of India (IAMAI), as of March 2013, Twitter had 33 million users across the country. An Economic Times report said that Twitter is eyeing India’s over 500 million mobile consumers as potential users, given that its service can be used on feature phones.
With statistics like that, no wonder brands are milking the popularity and reach of the micro-blogging site, albeit through people called ‘influencers’.
Earlier this month, a national dairy brand created a Twitter splash with the help of 50 influencers, with the campaign being the most talked about at the time. Similarly, Mahindra has identified an ‘influencer’ for its SuPer Milo in actress Gul Panag, who connects with the brand at many levels and campaigns regularly on Twitter.
So, who are these influencers whom brands are increasingly seeking out in order to grow their consumer base and widen their reach?
Social Wavelength joint CEO Sanjay Mehta says that there are three types of influencers. Firstly, the celebrity kinds, who may generate influence across many different areas and people; secondly, subject matter influencers, who are domain specialists and wield influence in specific categories such as automobiles or gadgets or fashion; and thirdly, peer influencers, who may not fall in the first two categories but have good influence over a sizeable group of tweeple (people on Twitter) who interact with them.
Mehta points out that of late, several brands have been engaging with influencers, in big or small ways; be it getting influencers to talk about their new mobile phone or getting them to initiate a tweetinar (a seminar on Twitter) on a topic of relevance. “At the end of the day of course, it is about getting engagement with the influencers, and through such engagement, managing to get an amplification of the brand via the wider network reach of the said influence,” Mehta explains.
A common perception among social media enthusiasts is that Twitter influencers are those who have a huge follower base. While FoxyMoron co-founder, director – new business Pratik Gupta, is of the view that while this is a crucial criterion and an influencer must have at least 1,500 followers, other factors too need to be taken into consideration. “The brand must select an influencer whose opinion and tone is in sync with the brand philosophy. The content tweeted must be consistently of good quality and at the same time, be memorable and valuable. Also from a brand perspective, it is important to ensure that the chosen influencer has not endorsed a competitor in the past. The final criterion one must look out for is dedication; the influencer must regularly and religiously tweet in order to keep his/her followers intrigued,” says Gupta.
For instance, for Maybelline New York India, Foxymoron identified a core group of influencers and called them the ‘Beauty Brigade’. This was done in order to create better products and a unique identity in a highly competitive market. Members of the brigade were the first to receive product samples and hear about contests. They played a major role in promoting brand awareness and product loyalty.
Gupta says that these days, brands engage with influencers in different ways including product sampling, reviews on blogs and DIY YouTube tutorials. Influencers give their opinions in the form of reviews and connect with their followers on a personal level. So, they tend to gain the trust of their followers apart from adding advocacy to brand campaigns. “They support the brand by enabling it to tap into their own fan base. Every consumer then becomes a potential word-of-mouth marketer, which is one of the biggest benefits to the brand. This becomes a win-win situation for the brand and the consumers”, explains Gupta.
That said, most brands are not very open about engaging with influencers on social media. And still, part of the success of the brand on Twitter campaigns definitely goes to its influencers!
iWorld
Meta warns 200 users after fake Whatsapp spyware attack
Italy-targeted campaign used unofficial app to deploy surveillance spyware.
MUMBAI: It looked like a message, but it behaved like a mole. Meta has warned around 200 users most of them in Italy after uncovering a targeted spyware campaign that weaponised a fake version of WhatsApp to infiltrate devices. The attack, first reported by Agenzia Nazionale Stampa Associata, relied on classic social engineering with a modern twist: persuading users to download an unofficial WhatsApp clone embedded with surveillance software. The malicious application, believed to be developed by Italian firm SIO through its subsidiary ASIGINT, was designed to mimic the real app closely enough to bypass suspicion.
Meta’s security teams identified roughly 200 individuals who may have installed the compromised version, triggering immediate countermeasures. Affected users were logged out of their accounts and issued alerts warning of potential privacy breaches, with the company describing the incident as a “targeted social engineering attempt” aimed at gaining device-level access.
The malicious app was not distributed via official app stores but circulated through third-party channels, where it was presented as a legitimate WhatsApp alternative. Once installed, it reportedly allowed external operators to access sensitive data stored on the device turning a simple download into a potential surveillance gateway.
According to Techcrunch, Meta is now preparing legal action against the spyware developers to curb further misuse. The company, however, has not disclosed details about the specific individuals targeted or the extent of data compromised.
A Whatsapp spokesperson reiterated that user safety remains the top priority, particularly for those misled into installing the fake iOS application. Meanwhile, reports from La Repubblica suggest the spyware may be linked to “Spyrtacus”, a strain previously associated with Android-based attacks that could intercept calls, activate microphones and even access cameras.
The episode underscores a growing reality in the digital age, the threat is no longer just what you download, but where you download it from. As unofficial apps become increasingly convincing, the line between communication tool and covert surveillance is getting harder to spot and far easier to exploit.






