iWorld
Spuul is now available on Amazon Fire TV and Android TV
MUMBAI: The VOD platform for Indian and regional content Spuul will now be available on Amazon’s Fire TV and Android TV as an application. The app can be downloaded from the Amazon store and Android Play stores. lt will also be available on other devices such as Kindle, Fire Stick and Fire Phone.
“With multiple devices and multiple platforms, it’s getting increasingly difficult for consumers to maintain different accounts on different applications and different devices. The Amazon Fire TV and Android TV apps are a step further in make streaming content a smooth, seamless experience for our viewers. Spuul lets you browse through a variety of movies on your phone, tablet, laptop, e-reader or TV wherever you go”, says Spuul Global CEO Subin Subaiah.
Viewers can link their existing Spuul account with the Amazon Fire TV app and Android TV app whereas new users can sign up on using their existing Facebook account.
While the interface of both the apps looks simplified and user friendly, it has been designed keeping in mind the appearance of channels on a television set top box. To further enhance the experience, the apps are also entirely remote controlled. While Android TV users can log in with either their Facebook or Google accounts, Amazon users are free to use their gaming controllers as remotes for the Fire TV app too.
The apps are designed with built-in features such as regular updates of latest Hindi, Tamil, Punjabi and other Indian regional language titles. Through this app, Spuul’s 12 million (1.2 crore) viewers across India, Pakistan, UK, US, Australia, New Zealand and Middle East will now enjoy fresh Indian content anytime and anywhere.
iWorld
Meta warns 200 users after fake Whatsapp spyware attack
Italy-targeted campaign used unofficial app to deploy surveillance spyware.
MUMBAI: It looked like a message, but it behaved like a mole. Meta has warned around 200 users most of them in Italy after uncovering a targeted spyware campaign that weaponised a fake version of WhatsApp to infiltrate devices. The attack, first reported by Agenzia Nazionale Stampa Associata, relied on classic social engineering with a modern twist: persuading users to download an unofficial WhatsApp clone embedded with surveillance software. The malicious application, believed to be developed by Italian firm SIO through its subsidiary ASIGINT, was designed to mimic the real app closely enough to bypass suspicion.
Meta’s security teams identified roughly 200 individuals who may have installed the compromised version, triggering immediate countermeasures. Affected users were logged out of their accounts and issued alerts warning of potential privacy breaches, with the company describing the incident as a “targeted social engineering attempt” aimed at gaining device-level access.
The malicious app was not distributed via official app stores but circulated through third-party channels, where it was presented as a legitimate WhatsApp alternative. Once installed, it reportedly allowed external operators to access sensitive data stored on the device turning a simple download into a potential surveillance gateway.
According to Techcrunch, Meta is now preparing legal action against the spyware developers to curb further misuse. The company, however, has not disclosed details about the specific individuals targeted or the extent of data compromised.
A Whatsapp spokesperson reiterated that user safety remains the top priority, particularly for those misled into installing the fake iOS application. Meanwhile, reports from La Repubblica suggest the spyware may be linked to “Spyrtacus”, a strain previously associated with Android-based attacks that could intercept calls, activate microphones and even access cameras.
The episode underscores a growing reality in the digital age, the threat is no longer just what you download, but where you download it from. As unofficial apps become increasingly convincing, the line between communication tool and covert surveillance is getting harder to spot and far easier to exploit.






