Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
India Mandates ‘Undeletable’ Government Cybersecurity App for All Smartphones

India Mandates ‘Undeletable’ Government Cybersecurity App for All Smartphones

Posted on December 2, 2025December 2, 2025 By CWS

India’s Division of Telecommunications (DoT) has ordered smartphone producers to preload a government-backed cybersecurity app, “Sanchar Saathi,” on all new units offered within the nation.

The order, issued privately on November 28, 2025, provides main gamers like Apple, Samsung, Xiaomi, Vivo, and Oppo 90 days to conform, requiring the “Sanchar Saathi” app to be put in as a non-removable function on each handset.​

The transfer indicators a major tightening of state management over shopper electronics on this planet’s second-largest telecom market, which boasts over 1.2 billion subscribers.

Authorities officers argue the measure is a essential protection in opposition to a surge in digital fraud and cybercrime. In accordance with the directive, the app serves as a “citizen-centric” defend, enabling authorities to curb using stolen telephones and fight spoofed IMEI numbers, which are sometimes utilized in legal actions.​

Sanchar Saathi: A Digital “Communication Companion”

Launched earlier this 12 months, the Sanchar Saathi (Hindi for “Communication Companion”) platform was initially an online portal designed to empower cell subscribers. The obligatory app model integrates a number of key security options straight into the person interface:​

Chakshu: A reporting device for suspected fraud communications, together with malicious calls, SMS, or WhatsApp messages.​

Misplaced/Stolen Cell Blocking: Makes use of the Central Tools Identification Register (CEIR) to dam stolen units throughout all networks, rendering them ineffective to thieves.​

Connection Administration: Permits customers to verify “Know Cell Connections in Your Identify” to determine unauthorized SIM playing cards registered in opposition to their identification.​

Genuineness Checks: Verifies if a tool’s {hardware} and IMEI are genuine.​

Whereas the federal government highlights recovered units over 700,000 misplaced telephones have reportedly been traced utilizing the system, the obligatory nature of the app has sparked rapid concern.​

Trade Pushback and Privateness Fears

The directive requires that the app be “undeletable,” a situation that’s more likely to upset privateness advocates and producers like Apple, which has traditionally resisted preloading third-party software program.

Trade executives, talking on situation of anonymity, expressed frustration over the shortage of prior session, fearing the “compelled” app might compromise person belief and gadget efficiency.​

Privateness advocates are involved {that a} government-controlled app with intensive system entry might theoretically be used for surveillance. Nonetheless, the Indian authorities has constantly denied such intentions, stating that the directive is solely a shopper safety measure.

Producers should additionally push the app to present units by way of software program updates, guaranteeing the complete lively person base is finally coated.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:App, Cybersecurity, Government, India, Mandates, Smartphones, Undeletable

Post navigation

Previous Post: Malicious VS Code Extension as Icon Theme Attacking Windows and macOS Users
Next Post: Google Patches 107 Android Flaws, Including Two Framework Bugs Exploited in the Wild

Related Posts

Hackers Can Bypass EDR by Downloading Malicious File as In-Memory PE Loader Hackers Can Bypass EDR by Downloading Malicious File as In-Memory PE Loader Cyber Security News
Critical Honeywell CCTV Flaw Exposes User Accounts Critical Honeywell CCTV Flaw Exposes User Accounts Cyber Security News
SonicWall SSLVPN Under Attack Following the Breach of All Customers’ Firewall Backups SonicWall SSLVPN Under Attack Following the Breach of All Customers’ Firewall Backups Cyber Security News
Critical Axios Flaw Allows Node.js Server Crashes Critical Axios Flaw Allows Node.js Server Crashes Cyber Security News
Dropping Elephant Hacker Group Attacks Defense Sector Using Python Backdoor via MSBuild Dropper Dropping Elephant Hacker Group Attacks Defense Sector Using Python Backdoor via MSBuild Dropper Cyber Security News
Proxyware Malware Disguised as Notepad++ Tool Leverages Windows Explorer Process to Hijack Systems Proxyware Malware Disguised as Notepad++ Tool Leverages Windows Explorer Process to Hijack Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark