Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Apple Tests Encrypted RCS Messaging in iOS Beta

Apple Tests Encrypted RCS Messaging in iOS Beta

Posted on February 17, 2026 By CWS

Apple has unveiled a new developer beta version of iOS and iPadOS that introduces support for end-to-end encryption in Rich Communications Services (RCS) messaging. This feature, currently in the testing phase for iOS and iPadOS version 26.4 Beta, is anticipated to become available to a wider audience in forthcoming updates for iOS, iPadOS, macOS, and watchOS.

According to Apple’s release notes, the encryption feature is still in the beta stage and is not yet universally accessible across all devices or carriers. Conversations marked as encrypted are protected end-to-end, ensuring message security during transmission. However, this secure messaging capability is presently confined to communications between Apple devices, excluding platforms like Android.

Background on RCS Encryption

The introduction of encrypted RCS messaging by Apple follows nearly a year after the GSM Association (GSMA) declared its endorsement of end-to-end encryption for messages sent through the RCS protocol. Implementing E2EE for RCS necessitates that Apple adopts RCS Universal Profile 3.0, which utilizes the Messaging Layer Security (MLS) protocol.

Apple’s decision to test this feature underscores its ongoing commitment to enhancing privacy and security for its users. By leveraging advanced encryption standards, Apple aims to provide a secure communication channel for its customers.

Additional Security Enhancements

In addition to encrypted messaging, the latest beta introduces a feature allowing applications to opt into the comprehensive safeguards offered by Memory Integrity Enforcement (MIE). Previously, applications could only utilize a Soft Mode. MIE, announced last September, is designed to defend against sophisticated spyware attacks by ensuring continuous memory safety protection across critical system areas without affecting performance.

This advancement highlights Apple’s effort to bolster security measures against potential threats, enhancing the resilience of its platform against unauthorized intrusions.

Device Protection Features

Further security improvements include the anticipated activation of Stolen Device Protection by default for all iPhone users in iOS 26.4. This feature enhances device security by requiring Face ID or Touch ID for sensitive actions such as accessing stored passwords and credit cards, especially when the device is away from familiar locations.

Moreover, the Stolen Device Protection feature introduces a one-hour delay for Apple Account password changes. This safety measure provides users with a crucial timeframe to report their device as lost if necessary, thereby adding an extra layer of protection.

As Apple continues to prioritize security in its software developments, these new features reflect its dedication to safeguarding user data and maintaining robust security standards across its ecosystem.

The Hacker News Tags:Apple, developer beta, E2EE, Encryption, IOS, iPadOS, iPhone, Memory Integrity Enforcement, mobile security, RCS, Stolen Device Protection, technology news

Post navigation

Previous Post: Critical Flaws Found in Major Cloud Password Managers
Next Post: Critical Apache NiFi Flaw Allows Access Control Bypass

Related Posts

Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor The Hacker News
JPCERT Confirms Active Command Injection Attacks on Array AG Gateways JPCERT Confirms Active Command Injection Attacks on Array AG Gateways The Hacker News
295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager 295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager The Hacker News
Cisco Warns of Actively Exploited SNMP Vulnerability Allowing RCE or DoS in IOS Software Cisco Warns of Actively Exploited SNMP Vulnerability Allowing RCE or DoS in IOS Software The Hacker News
Microsoft Patches 67 Vulnerabilities Including WEBDAV Zero-Day Exploited in the Wild Microsoft Patches 67 Vulnerabilities Including WEBDAV Zero-Day Exploited in the Wild The Hacker News
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Kickstart Your Intelligent Workflow Program with 3 Key Strategies
  • MetaMask Phishing Scam Uses Fake Security Reports
  • Cogent Secures $42M to Enhance AI for Vulnerability Management
  • Navigating Cybersecurity Amidst Constant Instability
  • Critical Zero-Day Flaws in PDF Software Risk Data Exposure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Kickstart Your Intelligent Workflow Program with 3 Key Strategies
  • MetaMask Phishing Scam Uses Fake Security Reports
  • Cogent Secures $42M to Enhance AI for Vulnerability Management
  • Navigating Cybersecurity Amidst Constant Instability
  • Critical Zero-Day Flaws in PDF Software Risk Data Exposure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News