iWorld
ZEE5 launches another original series- Babbar Ka Tabbar
MUMBAI: After Zero KMS, ZEEL’s digital platform, ZEE5 today launched another web series named Babbar Ka Tabbar.
This humorous family drama reflects the time that we live in and address the generation gap between today’s youths and parents in a quirky manner.
This 12 episodic series has been shot in Delhi and will be launching in two parts. Viewers can watch 2 episodes for free and then go premium to uncover the rest of the drama. Manu Rishi, Anshuman Jha, Ayesha Raza, Avneet Kaur and Bhavin Bhanushali are playing the main characters. A ‘trying too hard to be cool’ father, an over-protective mother, a socially-awkward son, an overconfident daughter and a good-for-nothing paying guest-cum-family therapist.
ZEE5 India Chief Marketing Officer Manish Aggarwal said, “After Life Sahi Hai 2, here is another mass entertainer from our OC stable. We are confident that the Babbars and Jamia will be loved as much as the rest of our characters. Since our launch, we have been registering viewers from across the country, which are seeking entertainment and are willing to pay for it. This is in keeping with the content strategy we have carefully chalked out for ZEE5, and viewers have much to look forward to in the coming months.”
Producer, Victor Mukherjee, is very excited about partnering with ZEE5 on a format that is very unique. “It has been an absolute pleasure working with such brilliant actors. We do hope the viewers enjoy watching it as much as we enjoyed making it”.
Also Read:
Diverse language content the pivot for ZEE5’s growth
iWorld
Meta warns 200 users after fake Whatsapp spyware attack
Italy-targeted campaign used unofficial app to deploy surveillance spyware.
MUMBAI: It looked like a message, but it behaved like a mole. Meta has warned around 200 users most of them in Italy after uncovering a targeted spyware campaign that weaponised a fake version of WhatsApp to infiltrate devices. The attack, first reported by Agenzia Nazionale Stampa Associata, relied on classic social engineering with a modern twist: persuading users to download an unofficial WhatsApp clone embedded with surveillance software. The malicious application, believed to be developed by Italian firm SIO through its subsidiary ASIGINT, was designed to mimic the real app closely enough to bypass suspicion.
Meta’s security teams identified roughly 200 individuals who may have installed the compromised version, triggering immediate countermeasures. Affected users were logged out of their accounts and issued alerts warning of potential privacy breaches, with the company describing the incident as a “targeted social engineering attempt” aimed at gaining device-level access.
The malicious app was not distributed via official app stores but circulated through third-party channels, where it was presented as a legitimate WhatsApp alternative. Once installed, it reportedly allowed external operators to access sensitive data stored on the device turning a simple download into a potential surveillance gateway.
According to Techcrunch, Meta is now preparing legal action against the spyware developers to curb further misuse. The company, however, has not disclosed details about the specific individuals targeted or the extent of data compromised.
A Whatsapp spokesperson reiterated that user safety remains the top priority, particularly for those misled into installing the fake iOS application. Meanwhile, reports from La Repubblica suggest the spyware may be linked to “Spyrtacus”, a strain previously associated with Android-based attacks that could intercept calls, activate microphones and even access cameras.
The episode underscores a growing reality in the digital age, the threat is no longer just what you download, but where you download it from. As unofficial apps become increasingly convincing, the line between communication tool and covert surveillance is getting harder to spot and far easier to exploit.






