• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta

You are here: Home / General Cyber Security News / Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta
February 17, 2026

Apple on Monday released a new developer beta of iOS and iPadOS with support for end-to-end encryption (E2EE) in Rich Communications Services (RCS) messages.

The feature is currently available for testing in iOS and iPadOS 26.4 Beta, and is expected to be shipped to customers in a future update for iOS, iPadOS, macOS, and watchOS.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“End-to-end encryption is in beta and is not available for all devices or carriers,” Apple said in its release notes. “Conversations labeled as encrypted are encrypted end-to-end, so messages can’t be read while they’re sent between devices.”

The iPhone maker also pointed out that the availability of RCS encryption is limited to conversations between Apple devices, and not other platforms like Android.

The secure messaging test arrives nearly a year after the GSM Association (GSMA) formally announced support for E2EE for safeguarding messages sent via the RCS protocol. E2EE for RCS‌ will require Apple to update to ‌RCS‌ Universal Profile 3.0, which is built atop the Messaging Layer Security (MLS) protocol. 

Cybersecurity

The latest beta also comes with a new feature that allows applications to opt in to the full safeguards of Memory Integrity Enforcement (MIE) for enhanced memory safety protection. Previously, applications were limited to Soft Mode, Apple said.

MIE was unveiled by the company last September as a way to counter sophisticated mercenary spyware attacks targeting its platform by offering “always-on memory safety protection” across critical attack surfaces such as the kernel and over 70 userland processes without imposing any performance overhead.

According to a report from MacRumors, iOS 26.4 is also expected to enable Stolen Device Protection by default for all iPhone users. The feature adds an extra layer of security by requiring Face ID or Touch ID biometric authentication when performing sensitive actions like accessing stored passwords and credit cards when the device is away from familiar locations, such as home or work.

Stolen Device Protection also adds a one-hour delay before making Apple Account password changes, on top of the Face ID or Touch ID authentication to give users some time to mark their device as lost in the event it gets stolen.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «infostealer steals openclaw ai agent configuration files and gateway tokens Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta
  • Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens
  • Study Uncovers 25 Password Recovery Attacks in Major Cloud Password Managers
  • Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malware
  • Safe and Inclusive E‑Society: How Lithuania Is Bracing for AI‑Driven Cyber Fraud
  • New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft
  • New Chrome Zero-Day (CVE-2026-2441) Under Active Attack — Patch Released
  • Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging
  • Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs
  • Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

Copyright © TheCyberSecurity.News, All Rights Reserved.