iWorld
Prasar Bharati rides new Waves with Shucae Films OTT content tie-up
MUMBAI: India’s national broadcaster is catching the OTT tide and this one’s making Waves. In a move that blends legacy media with fresh digital storytelling, Prasar Bharati has partnered with Shucae Films to host the latter’s vibrant catalogue on its OTT platform Waves, with select content also airing across its television channels. The alliance brings a medley of Shucae’s web shows to Prasar Bharati’s growing digital stable. Think romantic twists, comedic chaos, and indie grit with titles like Jaane Kyun, It’s a Match, Pyaar Ke Panne, Bolo Pencil, Love Forever, Yeh Hai Meri Love Story!, and more now streaming for free.
By roping in Shucae’s younger, internet-savvy audience and juxtaposing it with its traditional viewership, Prasar Bharati is shaping Waves as a platform that doesn’t just preserve culture but also mirrors current content trends. The move also reflects the broadcaster’s broader digital-first ambition.
“This partnership reflects our commitment to offering vibrant, diverse and engaging content,” said Prasar Bharati CEO Gaurav Dwivedi. “Waves continues to evolve as a digital-first platform showcasing the best of Indian storytelling.”
Shucae Films CEO Manoj Doogra added, “We’re thrilled to bring our stories to a wider audience through Prasar Bharati. Waves is the perfect platform to blend entertainment with impact.”
From love stories to offbeat dramas, the line-up adds colour to Waves’ growing content pool. It also signals a stronger future for public broadcasters leaning into contemporary formats and co-creating with India’s expanding OTT talent pool. Whether it’s the nostalgia of Doordarshan or the now-ness of web series, this is storytelling tuned to every screen.
iWorld
Meta warns 200 users after fake Whatsapp spyware attack
Italy-targeted campaign used unofficial app to deploy surveillance spyware.
MUMBAI: It looked like a message, but it behaved like a mole. Meta has warned around 200 users most of them in Italy after uncovering a targeted spyware campaign that weaponised a fake version of WhatsApp to infiltrate devices. The attack, first reported by Agenzia Nazionale Stampa Associata, relied on classic social engineering with a modern twist: persuading users to download an unofficial WhatsApp clone embedded with surveillance software. The malicious application, believed to be developed by Italian firm SIO through its subsidiary ASIGINT, was designed to mimic the real app closely enough to bypass suspicion.
Meta’s security teams identified roughly 200 individuals who may have installed the compromised version, triggering immediate countermeasures. Affected users were logged out of their accounts and issued alerts warning of potential privacy breaches, with the company describing the incident as a “targeted social engineering attempt” aimed at gaining device-level access.
The malicious app was not distributed via official app stores but circulated through third-party channels, where it was presented as a legitimate WhatsApp alternative. Once installed, it reportedly allowed external operators to access sensitive data stored on the device turning a simple download into a potential surveillance gateway.
According to Techcrunch, Meta is now preparing legal action against the spyware developers to curb further misuse. The company, however, has not disclosed details about the specific individuals targeted or the extent of data compromised.
A Whatsapp spokesperson reiterated that user safety remains the top priority, particularly for those misled into installing the fake iOS application. Meanwhile, reports from La Repubblica suggest the spyware may be linked to “Spyrtacus”, a strain previously associated with Android-based attacks that could intercept calls, activate microphones and even access cameras.
The episode underscores a growing reality in the digital age, the threat is no longer just what you download, but where you download it from. As unofficial apps become increasingly convincing, the line between communication tool and covert surveillance is getting harder to spot and far easier to exploit.






