iWorld
Women’s World Cup hits record viewership highs
MUMBAI: Cricket fever has turned into a full-blown phenomenon as the ICC Women’s Cricket World Cup India 2025 smashes viewership records faster than a boundary off a power hitter’s bat.
Over 60 million viewers have already tuned in to the first 13 matches across Jiohotstar and Star Sports Network, a staggering five times more than the previous edition. Watch-time has also soared 12-fold to a jaw-dropping 7 billion minutes, proving that women’s cricket isn’t just winning hearts, it’s ruling screens.
The India vs Pakistan showdown on 5 October bowled the world over, becoming the most-watched women’s international cricket match in history with a reach of 28.4 million and 1.87 billion minutes watched. The India vs Australia clash wasn’t far behind, hitting a record 4.8 million peak concurrent viewers on Jiohotstar, the highest ever for women’s cricket.
Television audiences have been equally captivated. The India–Pakistan league game has become the highest-rated in Women’s ODI World Cup history, while the first 11 matches together reached 72 million viewers, marking a 166 per cent leap from the last tournament. Viewing minutes jumped 327 per cent to 6.3 billion, underscoring the growing passion for the women’s game.
“The incredible viewership for the ICC Women’s Cricket World Cup India 2025 is a true testament to the growing interest in women’s sports in India,” said Jiostar head of viewership and monetisation initiatives – sports Siddharth Sharma. “Fans are embracing women’s sports like never before, and at Jiostar, we’re proud to be the platform powering this movement.”
Much of the success stems from a unified marketing push by the ICC and Jiostar, supported by the BCCI. The ICC’s global ‘Will to Win’ campaign and Jiostar’s emotionally charged ‘Jersey wahi toh jazbaa wahi’ have together sparked a national conversation and brought fans closer to the women in blue.
The matches are being broadcast in five languages: English, Hindi, Tamil, Telugu, and Kannada, across Jiohotstar and Star Sports channels, with an Indian sign language feed introduced for the first time to make the game more inclusive.
iWorld
Meta warns 200 users after fake Whatsapp spyware attack
Italy-targeted campaign used unofficial app to deploy surveillance spyware.
MUMBAI: It looked like a message, but it behaved like a mole. Meta has warned around 200 users most of them in Italy after uncovering a targeted spyware campaign that weaponised a fake version of WhatsApp to infiltrate devices. The attack, first reported by Agenzia Nazionale Stampa Associata, relied on classic social engineering with a modern twist: persuading users to download an unofficial WhatsApp clone embedded with surveillance software. The malicious application, believed to be developed by Italian firm SIO through its subsidiary ASIGINT, was designed to mimic the real app closely enough to bypass suspicion.
Meta’s security teams identified roughly 200 individuals who may have installed the compromised version, triggering immediate countermeasures. Affected users were logged out of their accounts and issued alerts warning of potential privacy breaches, with the company describing the incident as a “targeted social engineering attempt” aimed at gaining device-level access.
The malicious app was not distributed via official app stores but circulated through third-party channels, where it was presented as a legitimate WhatsApp alternative. Once installed, it reportedly allowed external operators to access sensitive data stored on the device turning a simple download into a potential surveillance gateway.
According to Techcrunch, Meta is now preparing legal action against the spyware developers to curb further misuse. The company, however, has not disclosed details about the specific individuals targeted or the extent of data compromised.
A Whatsapp spokesperson reiterated that user safety remains the top priority, particularly for those misled into installing the fake iOS application. Meanwhile, reports from La Repubblica suggest the spyware may be linked to “Spyrtacus”, a strain previously associated with Android-based attacks that could intercept calls, activate microphones and even access cameras.
The episode underscores a growing reality in the digital age, the threat is no longer just what you download, but where you download it from. As unofficial apps become increasingly convincing, the line between communication tool and covert surveillance is getting harder to spot and far easier to exploit.






