Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
India Mandates ‘Undeletable’ Government Cybersecurity App for All Smartphones

India Mandates ‘Undeletable’ Government Cybersecurity App for All Smartphones

Posted on December 2, 2025December 2, 2025 By CWS

India’s Division of Telecommunications (DoT) has ordered smartphone producers to preload a government-backed cybersecurity app, “Sanchar Saathi,” on all new units offered within the nation.

The order, issued privately on November 28, 2025, provides main gamers like Apple, Samsung, Xiaomi, Vivo, and Oppo 90 days to conform, requiring the “Sanchar Saathi” app to be put in as a non-removable function on each handset.​

The transfer indicators a major tightening of state management over shopper electronics on this planet’s second-largest telecom market, which boasts over 1.2 billion subscribers.

Authorities officers argue the measure is a essential protection in opposition to a surge in digital fraud and cybercrime. In accordance with the directive, the app serves as a “citizen-centric” defend, enabling authorities to curb using stolen telephones and fight spoofed IMEI numbers, which are sometimes utilized in legal actions.​

Sanchar Saathi: A Digital “Communication Companion”

Launched earlier this 12 months, the Sanchar Saathi (Hindi for “Communication Companion”) platform was initially an online portal designed to empower cell subscribers. The obligatory app model integrates a number of key security options straight into the person interface:​

Chakshu: A reporting device for suspected fraud communications, together with malicious calls, SMS, or WhatsApp messages.​

Misplaced/Stolen Cell Blocking: Makes use of the Central Tools Identification Register (CEIR) to dam stolen units throughout all networks, rendering them ineffective to thieves.​

Connection Administration: Permits customers to verify “Know Cell Connections in Your Identify” to determine unauthorized SIM playing cards registered in opposition to their identification.​

Genuineness Checks: Verifies if a tool’s {hardware} and IMEI are genuine.​

Whereas the federal government highlights recovered units over 700,000 misplaced telephones have reportedly been traced utilizing the system, the obligatory nature of the app has sparked rapid concern.​

Trade Pushback and Privateness Fears

The directive requires that the app be “undeletable,” a situation that’s more likely to upset privateness advocates and producers like Apple, which has traditionally resisted preloading third-party software program.

Trade executives, talking on situation of anonymity, expressed frustration over the shortage of prior session, fearing the “compelled” app might compromise person belief and gadget efficiency.​

Privateness advocates are involved {that a} government-controlled app with intensive system entry might theoretically be used for surveillance. Nonetheless, the Indian authorities has constantly denied such intentions, stating that the directive is solely a shopper safety measure.

Producers should additionally push the app to present units by way of software program updates, guaranteeing the complete lively person base is finally coated.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:App, Cybersecurity, Government, India, Mandates, Smartphones, Undeletable

Post navigation

Previous Post: Malicious VS Code Extension as Icon Theme Attacking Windows and macOS Users
Next Post: Google Patches 107 Android Flaws, Including Two Framework Bugs Exploited in the Wild

Related Posts

Top 20 Most Exploited Vulnerabilities of 2025 Top 20 Most Exploited Vulnerabilities of 2025 Cyber Security News
Apache Tomcat Vulnerabilities Let Attackers Bypass Authentication & Trigger DoS Attacks Apache Tomcat Vulnerabilities Let Attackers Bypass Authentication & Trigger DoS Attacks Cyber Security News
Cloaking Platform 1Campaign Bypasses Google Ads Security Cloaking Platform 1Campaign Bypasses Google Ads Security Cyber Security News
Makop Ransomware Exploits RDP Systems with AV Killer and Other Exploits Makop Ransomware Exploits RDP Systems with AV Killer and Other Exploits Cyber Security News
MonetaStealer Malware Powered with AI Code Attacking macOS Users in the Wild MonetaStealer Malware Powered with AI Code Attacking macOS Users in the Wild Cyber Security News
Windows 11 24H2 Update Hides the Password Icon in the Sign-in Options on the Lock Screen Windows 11 24H2 Update Hides the Password Icon in the Sign-in Options on the Lock Screen Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark