iWorld
IPL 2022: YuppTV bags broadcasting rights in 99 countries
Mumbai: Streaming platform YuppTV has bagged the international broadcasting rights of Tata IPL 2022 in 99 countries. This is its fifth consecutive year for the platform to stream the tournament abroad.
The matches will be broadcast in the regions of Australia, Continental Europe, South East Asia (except Singapore), Malaysia, Central and South America, Central Asia, Sri Lanka, Pakistan, Japan, Nepal, Bhutan, Maldives etc.
“Cricket has always been a massive crowd-puller and IPL has reimagined the format and the excitement associated with it,” said YuppTV founder and CEO Uday Reddy. “In alignment with the objective of bringing cricket to the masses, we are delighted to be the streaming platform of choice in expanding the outreach to 99 nations across the globe. We are ensuring that our robust backend technology will support uninterrupted, real-time streaming of the sport that puts India on the world map with respect to international leagues.”
“We’re happy to be continuing our long-standing association with YuppTV who continue to serve the global Indian diaspora with world-class content,” said Disney Star head of acquisition and syndication Harry Griffith. “The Tata IPL 2022 promises to be the largest and most exciting edition since its inception.”
Tata IPL 2022, which began airing on 26 March, marks the debut of two new franchises Gujarat Titans (GT) and Lucknow Super Giants (LSG) along with the existing franchises Chennai Super Kings (CSK), Delhi Capitals (DC), Kolkata Knight Riders (KKR), Mumbai Indians (MI), Punjab Kings (PBKS), Rajasthan Royals (RR), Royal Challengers Bangalore (RCB) and Sunrisers Hyderabad (SRH).
The league matches will be held at Wankhede Stadium, Brabourne Stadium and DY Patil Stadium in Mumbai, and MCA International Stadium in Pune. The tournament comprises 74 matches this season.
iWorld
Meta warns 200 users after fake Whatsapp spyware attack
Italy-targeted campaign used unofficial app to deploy surveillance spyware.
MUMBAI: It looked like a message, but it behaved like a mole. Meta has warned around 200 users most of them in Italy after uncovering a targeted spyware campaign that weaponised a fake version of WhatsApp to infiltrate devices. The attack, first reported by Agenzia Nazionale Stampa Associata, relied on classic social engineering with a modern twist: persuading users to download an unofficial WhatsApp clone embedded with surveillance software. The malicious application, believed to be developed by Italian firm SIO through its subsidiary ASIGINT, was designed to mimic the real app closely enough to bypass suspicion.
Meta’s security teams identified roughly 200 individuals who may have installed the compromised version, triggering immediate countermeasures. Affected users were logged out of their accounts and issued alerts warning of potential privacy breaches, with the company describing the incident as a “targeted social engineering attempt” aimed at gaining device-level access.
The malicious app was not distributed via official app stores but circulated through third-party channels, where it was presented as a legitimate WhatsApp alternative. Once installed, it reportedly allowed external operators to access sensitive data stored on the device turning a simple download into a potential surveillance gateway.
According to Techcrunch, Meta is now preparing legal action against the spyware developers to curb further misuse. The company, however, has not disclosed details about the specific individuals targeted or the extent of data compromised.
A Whatsapp spokesperson reiterated that user safety remains the top priority, particularly for those misled into installing the fake iOS application. Meanwhile, reports from La Repubblica suggest the spyware may be linked to “Spyrtacus”, a strain previously associated with Android-based attacks that could intercept calls, activate microphones and even access cameras.
The episode underscores a growing reality in the digital age, the threat is no longer just what you download, but where you download it from. As unofficial apps become increasingly convincing, the line between communication tool and covert surveillance is getting harder to spot and far easier to exploit.






