iWorld
Vice Media to launch Vice India on April 2
MUMBAI: New York-based millennial-targeted media brand Vice Media is all set to mark its presence in the Indian entertainment industry with Vice India on 2 April 2018.
Hosi Simon, the CEO of Vice Media Asia Pacific, announced the launch date in Mumbai on the third day of FICCI Frames 2018.
Vice Media has been around for 24 years. In June 2016, Vice Media and The Times Group collaborated for an ‘expansive partnership.’ The joint venture by Vice Media is done to bring its youth-focused content to many more territories, mixing local and international news, culture and lifestyle programming to young viewers across online, television and mobile. The content on Vice India will be an equal half split between local content and content from abroad.
The launch of Vice Media’s TV service ‘Viceland’ with the name ‘Vice Now’ in India as a pay channel is also a part of the joint venture.
Vice India will open up their offices in Mumbai and Delhi. Recently, Chanpreet Arora was appointed as the chief executive officer (CEO) of Vice India. Earlier, Vice India had appointed Pragya Tiwari as the editor-in-chief and Samira Kanwar as the head of video. Since then, Tiwari has left Vice India citing personal reasons and Kanwar has been designated as content head of the firm.
For India, according to Simon, the goal is to be a deeply local, relevant company.
Simon said that Vice would adopt a studio approach and the focus will be on the story, no matter from where and whomsoever it comes
The company will have a production hub that will create different kinds of content including long form, short form and documentaries.
Also Read:
Localised content the way forward for Netflix in India
2017: The year OTTs went regional in India
iWorld
Meta warns 200 users after fake Whatsapp spyware attack
Italy-targeted campaign used unofficial app to deploy surveillance spyware.
MUMBAI: It looked like a message, but it behaved like a mole. Meta has warned around 200 users most of them in Italy after uncovering a targeted spyware campaign that weaponised a fake version of WhatsApp to infiltrate devices. The attack, first reported by Agenzia Nazionale Stampa Associata, relied on classic social engineering with a modern twist: persuading users to download an unofficial WhatsApp clone embedded with surveillance software. The malicious application, believed to be developed by Italian firm SIO through its subsidiary ASIGINT, was designed to mimic the real app closely enough to bypass suspicion.
Meta’s security teams identified roughly 200 individuals who may have installed the compromised version, triggering immediate countermeasures. Affected users were logged out of their accounts and issued alerts warning of potential privacy breaches, with the company describing the incident as a “targeted social engineering attempt” aimed at gaining device-level access.
The malicious app was not distributed via official app stores but circulated through third-party channels, where it was presented as a legitimate WhatsApp alternative. Once installed, it reportedly allowed external operators to access sensitive data stored on the device turning a simple download into a potential surveillance gateway.
According to Techcrunch, Meta is now preparing legal action against the spyware developers to curb further misuse. The company, however, has not disclosed details about the specific individuals targeted or the extent of data compromised.
A Whatsapp spokesperson reiterated that user safety remains the top priority, particularly for those misled into installing the fake iOS application. Meanwhile, reports from La Repubblica suggest the spyware may be linked to “Spyrtacus”, a strain previously associated with Android-based attacks that could intercept calls, activate microphones and even access cameras.
The episode underscores a growing reality in the digital age, the threat is no longer just what you download, but where you download it from. As unofficial apps become increasingly convincing, the line between communication tool and covert surveillance is getting harder to spot and far easier to exploit.






