Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta

The Hacker News by The Hacker News
February 17, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


Ravie LakshmananFeb 17, 2026Encryption / Mobile Security

Apple on Monday released a new developer beta of iOS and iPadOS with support for end-to-end encryption (E2EE) in Rich Communications Services (RCS) messages.

The feature is currently available for testing in iOS and iPadOS 26.4 Beta, and is expected to be shipped to customers in a future update for iOS, iPadOS, macOS, and watchOS.

“End-to-end encryption is in beta and is not available for all devices or carriers,” Apple said in its release notes. “Conversations labeled as encrypted are encrypted end-to-end, so messages can’t be read while they’re sent between devices.”

The iPhone maker also pointed out that the availability of RCS encryption is limited to conversations between Apple devices, and not other platforms like Android.

The secure messaging test arrives nearly a year after the GSM Association (GSMA) formally announced support for E2EE for safeguarding messages sent via the RCS protocol. E2EE for RCS‌ will require Apple to update to ‌RCS‌ Universal Profile 3.0, which is built atop the Messaging Layer Security (MLS) protocol. 

The latest beta also comes with a new feature that allows applications to opt in to the full safeguards of Memory Integrity Enforcement (MIE) for enhanced memory safety protection. Previously, applications were limited to Soft Mode, Apple said.

MIE was unveiled by the company last September as a way to counter sophisticated mercenary spyware attacks targeting its platform by offering “always-on memory safety protection” across critical attack surfaces such as the kernel and over 70 userland processes without imposing any performance overhead.

According to a report from MacRumors, iOS 26.4 is also expected to enable Stolen Device Protection by default for all iPhone users. The feature adds an extra layer of security by requiring Face ID or Touch ID biometric authentication when performing sensitive actions like accessing stored passwords and credit cards when the device is away from familiar locations, such as home or work.

Stolen Device Protection also adds a one-hour delay before making Apple Account password changes, on top of the Face ID or Touch ID authentication to give users some time to mark their device as lost in the event it gets stolen.



Source link

The Hacker News

The Hacker News

Next Post
Truecaller AB: Entering the next phase of growth

Truecaller AB: Entering the next phase of growth

Recommended.

AI success stems from better collaboration, not prompts

AI success stems from better collaboration, not prompts

March 19, 2026
Upbeat Technology Sets New Industry Standard with Novel MEMS Technology for AI Vibration and Bone-Conduction Applications

Upbeat Technology Sets New Industry Standard with Novel MEMS Technology for AI Vibration and Bone-Conduction Applications

December 20, 2025

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

March 24, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio