iWorld
PlayboxTV taps Samson Jesudas as new director & business head
New Delhi: Integrated Internet media distribution company PlayboxTV has named Samson Jesudas the new director and business head. Apart from the new role, he will continue to oversee the ISP Business.
As part of his new remit, Jesudas will be responsible for building nationwide PlayboxTV-OTT business using last-mile cable operators as business partners. He would also be responsible to ensure quality of service, corporate governance and customer experience as a key to success. Furthermore, he will play a significant role in the transition of local cable TV operators to the next level of the digital world and train them to give quality digital services to their end subscribers be it broadband or OTT, said the company on Wednesday.
Playbox founder & CEO Aamir Mulani said, “Samson has impeccable business and leadership skills. On behalf of the company’s board members, we welcome him on both of his new roles. We have complete faith in his extensive experience and visionary leadership that will drive the company forward.”
Microscan founder & CEO Sandeep Donde remarked, “Samson is a key person in building Microscan’s retail broadband business and with his amazing network skills and business relationships we feel he’ll do wonders on his additional role building nationwide OTT business.”
Jesudas added, “I am thankful to the board members and management to acknowledge my work and offer this huge responsibility. Furthermore, I am deeply humbled and honoured to lead the company with all my core values to bring positive outcomes to the company’s performance. I am delighted and look forward to working with the team.”
iWorld
Meta warns 200 users after fake Whatsapp spyware attack
Italy-targeted campaign used unofficial app to deploy surveillance spyware.
MUMBAI: It looked like a message, but it behaved like a mole. Meta has warned around 200 users most of them in Italy after uncovering a targeted spyware campaign that weaponised a fake version of WhatsApp to infiltrate devices. The attack, first reported by Agenzia Nazionale Stampa Associata, relied on classic social engineering with a modern twist: persuading users to download an unofficial WhatsApp clone embedded with surveillance software. The malicious application, believed to be developed by Italian firm SIO through its subsidiary ASIGINT, was designed to mimic the real app closely enough to bypass suspicion.
Meta’s security teams identified roughly 200 individuals who may have installed the compromised version, triggering immediate countermeasures. Affected users were logged out of their accounts and issued alerts warning of potential privacy breaches, with the company describing the incident as a “targeted social engineering attempt” aimed at gaining device-level access.
The malicious app was not distributed via official app stores but circulated through third-party channels, where it was presented as a legitimate WhatsApp alternative. Once installed, it reportedly allowed external operators to access sensitive data stored on the device turning a simple download into a potential surveillance gateway.
According to Techcrunch, Meta is now preparing legal action against the spyware developers to curb further misuse. The company, however, has not disclosed details about the specific individuals targeted or the extent of data compromised.
A Whatsapp spokesperson reiterated that user safety remains the top priority, particularly for those misled into installing the fake iOS application. Meanwhile, reports from La Repubblica suggest the spyware may be linked to “Spyrtacus”, a strain previously associated with Android-based attacks that could intercept calls, activate microphones and even access cameras.
The episode underscores a growing reality in the digital age, the threat is no longer just what you download, but where you download it from. As unofficial apps become increasingly convincing, the line between communication tool and covert surveillance is getting harder to spot and far easier to exploit.






