iWorld
Jio AirFiber set to be unveiled in September
Mumbai: Reliance Industries chairman Mukesh Ambani revealed in a virtual annual general meeting that Jio will launch Jio AirFiber, its fixed wireless access offering on 19 September. Jio, which has 50 million 5G users, shall have a pan- India coverage by December 2023. It will also be among the first globally to put 6G competencies in place, as per media reports.
The launch of Jio AirFiber comes on the heels of its rival, Bharti Airtel launching its own device commercially, and is anticipated to swell the former’s addressable market to over 200 million high-paying homes and premises, over the next three years.
Mukesh also brought out that “providing last-mile connectivity is a painstaking process in most parts of our country,” and that’s where the fixed-wireless broadband offering, Jio AirFiber, would play a role. Additionally, he pointed out that Jio has more than 450 million subscribers, say reports.
As of now, the pricing of the new offering is under wraps. The new service is expected help the telco multiply its connected premises to 1,50,000 connections per day, which is a 10-fold growth from 15,000 premises a day that optical fibre would allow.
Mukesh also underlined the in-house developed Jio 5G stack which possesses features like standalone 5G architecture, network slicing, carrier aggregation, and AI/ML capabilities.
Jio’s 5G customer has reached 50 million since the October 2022 launch, and Jio 5G is already present in over 96 per cent of the census towns of the country.
Reliance Jio chairman Akash Ambani also spoke about the telco building a ‘transformative platform’ which will alter the way Indian enterprises, small businesses, and tech start-ups work with the digital world.
He also announced the Jio True5G Developer Platform – a comprehensive platform combining the 5G network, edge computing, and a spectrum of applications and services.
iWorld
Meta warns 200 users after fake Whatsapp spyware attack
Italy-targeted campaign used unofficial app to deploy surveillance spyware.
MUMBAI: It looked like a message, but it behaved like a mole. Meta has warned around 200 users most of them in Italy after uncovering a targeted spyware campaign that weaponised a fake version of WhatsApp to infiltrate devices. The attack, first reported by Agenzia Nazionale Stampa Associata, relied on classic social engineering with a modern twist: persuading users to download an unofficial WhatsApp clone embedded with surveillance software. The malicious application, believed to be developed by Italian firm SIO through its subsidiary ASIGINT, was designed to mimic the real app closely enough to bypass suspicion.
Meta’s security teams identified roughly 200 individuals who may have installed the compromised version, triggering immediate countermeasures. Affected users were logged out of their accounts and issued alerts warning of potential privacy breaches, with the company describing the incident as a “targeted social engineering attempt” aimed at gaining device-level access.
The malicious app was not distributed via official app stores but circulated through third-party channels, where it was presented as a legitimate WhatsApp alternative. Once installed, it reportedly allowed external operators to access sensitive data stored on the device turning a simple download into a potential surveillance gateway.
According to Techcrunch, Meta is now preparing legal action against the spyware developers to curb further misuse. The company, however, has not disclosed details about the specific individuals targeted or the extent of data compromised.
A Whatsapp spokesperson reiterated that user safety remains the top priority, particularly for those misled into installing the fake iOS application. Meanwhile, reports from La Repubblica suggest the spyware may be linked to “Spyrtacus”, a strain previously associated with Android-based attacks that could intercept calls, activate microphones and even access cameras.
The episode underscores a growing reality in the digital age, the threat is no longer just what you download, but where you download it from. As unofficial apps become increasingly convincing, the line between communication tool and covert surveillance is getting harder to spot and far easier to exploit.






