iWorld
Full mobile number portability from July: Ravi Shankar Prasad
NEW DELHI: Communications and Information Technology minister Ravi Shankar Prasad has said that full mobile number portability will become operational across the country from July and consumers will get to keep the same numbers even when changing the telecom service provider.
He also announced on 2 June 2015 that Bharat Sanchar Nigam Limited (BSNL) will offer free roaming all over the country from 15 June.
The telecom minister further added that spectrum sharing and trading policy would go to the Cabinet this month.
Last month, BSNL introduced an unlimited free calling scheme from 9 pm and 7 am to revive its landline business. BSNL has the largest number of landline customers, with a market share of 62.26 per cent.
The Minister regretted that BSNL, which had shown profits in 2004, was showing a deficit at present.
When asked about frequent call drop complaints by consumers, the Minister said he has asked officials if a scheme of disincentive for the operators can be put in place.
“Call drops are due to lack of towers. As far as installation is concerned it is subject to local law. No point to raise bogey of cell tower radiation and then complain of call drop,” Prasad said.
Additionally, answering a question relating to the controversial Section 66A of the IT Act 2000, Prasad said that the government fully backs freedom of speech.
Section 66A defines the punishment for sending “offensive” messages through a computer or any other communication device like a mobile phone or a tablet. A conviction can fetch a maximum of three years in jail and a fine.
The Supreme Court is already examining the constitutional validity of Section 66A of the amended IT Act following a batch of petitions alleging the section impinges upon the Fundamental Right to freedom of speech and expression.
The Minister said, “The case was pending in the court before I joined the ministry.”
iWorld
Meta warns 200 users after fake Whatsapp spyware attack
Italy-targeted campaign used unofficial app to deploy surveillance spyware.
MUMBAI: It looked like a message, but it behaved like a mole. Meta has warned around 200 users most of them in Italy after uncovering a targeted spyware campaign that weaponised a fake version of WhatsApp to infiltrate devices. The attack, first reported by Agenzia Nazionale Stampa Associata, relied on classic social engineering with a modern twist: persuading users to download an unofficial WhatsApp clone embedded with surveillance software. The malicious application, believed to be developed by Italian firm SIO through its subsidiary ASIGINT, was designed to mimic the real app closely enough to bypass suspicion.
Meta’s security teams identified roughly 200 individuals who may have installed the compromised version, triggering immediate countermeasures. Affected users were logged out of their accounts and issued alerts warning of potential privacy breaches, with the company describing the incident as a “targeted social engineering attempt” aimed at gaining device-level access.
The malicious app was not distributed via official app stores but circulated through third-party channels, where it was presented as a legitimate WhatsApp alternative. Once installed, it reportedly allowed external operators to access sensitive data stored on the device turning a simple download into a potential surveillance gateway.
According to Techcrunch, Meta is now preparing legal action against the spyware developers to curb further misuse. The company, however, has not disclosed details about the specific individuals targeted or the extent of data compromised.
A Whatsapp spokesperson reiterated that user safety remains the top priority, particularly for those misled into installing the fake iOS application. Meanwhile, reports from La Repubblica suggest the spyware may be linked to “Spyrtacus”, a strain previously associated with Android-based attacks that could intercept calls, activate microphones and even access cameras.
The episode underscores a growing reality in the digital age, the threat is no longer just what you download, but where you download it from. As unofficial apps become increasingly convincing, the line between communication tool and covert surveillance is getting harder to spot and far easier to exploit.






