Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Apple Tests Encrypted RCS Messaging in iOS Beta

Apple Tests Encrypted RCS Messaging in iOS Beta

Posted on February 17, 2026 By CWS

Apple has unveiled a new developer beta version of iOS and iPadOS that introduces support for end-to-end encryption in Rich Communications Services (RCS) messaging. This feature, currently in the testing phase for iOS and iPadOS version 26.4 Beta, is anticipated to become available to a wider audience in forthcoming updates for iOS, iPadOS, macOS, and watchOS.

According to Apple’s release notes, the encryption feature is still in the beta stage and is not yet universally accessible across all devices or carriers. Conversations marked as encrypted are protected end-to-end, ensuring message security during transmission. However, this secure messaging capability is presently confined to communications between Apple devices, excluding platforms like Android.

Background on RCS Encryption

The introduction of encrypted RCS messaging by Apple follows nearly a year after the GSM Association (GSMA) declared its endorsement of end-to-end encryption for messages sent through the RCS protocol. Implementing E2EE for RCS necessitates that Apple adopts RCS Universal Profile 3.0, which utilizes the Messaging Layer Security (MLS) protocol.

Apple’s decision to test this feature underscores its ongoing commitment to enhancing privacy and security for its users. By leveraging advanced encryption standards, Apple aims to provide a secure communication channel for its customers.

Additional Security Enhancements

In addition to encrypted messaging, the latest beta introduces a feature allowing applications to opt into the comprehensive safeguards offered by Memory Integrity Enforcement (MIE). Previously, applications could only utilize a Soft Mode. MIE, announced last September, is designed to defend against sophisticated spyware attacks by ensuring continuous memory safety protection across critical system areas without affecting performance.

This advancement highlights Apple’s effort to bolster security measures against potential threats, enhancing the resilience of its platform against unauthorized intrusions.

Device Protection Features

Further security improvements include the anticipated activation of Stolen Device Protection by default for all iPhone users in iOS 26.4. This feature enhances device security by requiring Face ID or Touch ID for sensitive actions such as accessing stored passwords and credit cards, especially when the device is away from familiar locations.

Moreover, the Stolen Device Protection feature introduces a one-hour delay for Apple Account password changes. This safety measure provides users with a crucial timeframe to report their device as lost if necessary, thereby adding an extra layer of protection.

As Apple continues to prioritize security in its software developments, these new features reflect its dedication to safeguarding user data and maintaining robust security standards across its ecosystem.

The Hacker News Tags:Apple, developer beta, E2EE, Encryption, IOS, iPadOS, iPhone, Memory Integrity Enforcement, mobile security, RCS, Stolen Device Protection, technology news

Post navigation

Previous Post: Critical Flaws Found in Major Cloud Password Managers
Next Post: Critical Apache NiFi Flaw Allows Access Control Bypass

Related Posts

Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs The Hacker News
Beware the Hidden Costs of Pen Testing Beware the Hidden Costs of Pen Testing The Hacker News
Helping CISOs Speak the Language of Business Helping CISOs Speak the Language of Business The Hacker News
Iranian Hacker Pleads Guilty in  Million Robbinhood Ransomware Attack on Baltimore Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore The Hacker News
Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now The Hacker News
Adobe Commerce Flaw CVE-2025-54236 Lets Hackers Take Over Customer Accounts Adobe Commerce Flaw CVE-2025-54236 Lets Hackers Take Over Customer Accounts The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Navigating Cybersecurity Amidst Constant Instability
  • Critical Zero-Day Flaws in PDF Software Risk Data Exposure
  • Critical Vulnerabilities in PDF Platforms Addressed by Foxit and Apryse
  • Security Risks in Popular VS Code Extensions Identified
  • CISA Urges Action on Windows ActiveX RCE Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Navigating Cybersecurity Amidst Constant Instability
  • Critical Zero-Day Flaws in PDF Software Risk Data Exposure
  • Critical Vulnerabilities in PDF Platforms Addressed by Foxit and Apryse
  • Security Risks in Popular VS Code Extensions Identified
  • CISA Urges Action on Windows ActiveX RCE Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News