iWorld
Roamware raises $14 million to fuel global expansion
MUMBAI: San Jose headquartered Roamware Inc., the global player in roaming solutions for mobile communications, has raised $14 million in a Series C round of financing. The funds will be used to enhance the company’s product line and strengthen global operations to support growing demand for the company’s mobile roaming products.
The company’s previous investors, Accretive Technology Partners, DCM – Doll Capital Management and Shelter Capital Partners, co-led the growth-oriented round, states an official release.
“Roamware has been instrumental in engineering and building the new ecosystem of roaming services being adopted by mobile operators worldwide,” claims DCMgeneral partner Rob Theis.
Shelter Capital Partners general partner Bahram Nour-Omid says, “We have great confidence in Roamware’s international team and remain fully committed to bolstering Roamware’s global leadership position.”
According to global market research from Informa Telecoms & Media’s 2005 Global Roaming Report, wireless network operators plan to continue aggressively rolling out roaming solutions, building on an estimated $78 billion in roaming revenues from an estimated total roaming population of 207 million.
“A key driver in the roaming business is the emergence of managed roaming services, enabling operators to maximize revenues by retaining roaming traffic within operator groups or alliances,” said Roamware Chairman and CEO Mohan Gyani as per the release. “With more than 40 installations of our Traffic Redirection application, we are tackling this trend head-on and will continue to foster new innovations that meet the growing demands of the global roaming and value-added services market.”
iWorld
Meta warns 200 users after fake Whatsapp spyware attack
Italy-targeted campaign used unofficial app to deploy surveillance spyware.
MUMBAI: It looked like a message, but it behaved like a mole. Meta has warned around 200 users most of them in Italy after uncovering a targeted spyware campaign that weaponised a fake version of WhatsApp to infiltrate devices. The attack, first reported by Agenzia Nazionale Stampa Associata, relied on classic social engineering with a modern twist: persuading users to download an unofficial WhatsApp clone embedded with surveillance software. The malicious application, believed to be developed by Italian firm SIO through its subsidiary ASIGINT, was designed to mimic the real app closely enough to bypass suspicion.
Meta’s security teams identified roughly 200 individuals who may have installed the compromised version, triggering immediate countermeasures. Affected users were logged out of their accounts and issued alerts warning of potential privacy breaches, with the company describing the incident as a “targeted social engineering attempt” aimed at gaining device-level access.
The malicious app was not distributed via official app stores but circulated through third-party channels, where it was presented as a legitimate WhatsApp alternative. Once installed, it reportedly allowed external operators to access sensitive data stored on the device turning a simple download into a potential surveillance gateway.
According to Techcrunch, Meta is now preparing legal action against the spyware developers to curb further misuse. The company, however, has not disclosed details about the specific individuals targeted or the extent of data compromised.
A Whatsapp spokesperson reiterated that user safety remains the top priority, particularly for those misled into installing the fake iOS application. Meanwhile, reports from La Repubblica suggest the spyware may be linked to “Spyrtacus”, a strain previously associated with Android-based attacks that could intercept calls, activate microphones and even access cameras.
The episode underscores a growing reality in the digital age, the threat is no longer just what you download, but where you download it from. As unofficial apps become increasingly convincing, the line between communication tool and covert surveillance is getting harder to spot and far easier to exploit.






