Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Apple Rolls Out E2EE for RCS Across iPhone and Android

May 12, 2026

Progress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass

May 12, 2026

South Staffordshire Water Fined £1m After Data Breach

May 12, 2026
Facebook X (Twitter) Instagram
Tuesday, May 12
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Apple Rolls Out E2EE for RCS Across iPhone and Android
News

Apple Rolls Out E2EE for RCS Across iPhone and Android

Team-CWDBy Team-CWDMay 12, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


End-to-end encrypted (E2EE) Rich Communication Services (RCS) messaging is being rolled out in beta between iPhone and Android handsets, closing one of the longest-running interoperability gaps in mainstream mobile messaging.

Apple announced the beta rollout on May 11, with Google confirming the matching Android-side rollout.

The feature is available to iPhone users on iOS 26.5 with supported carriers and to Android users on the latest version of Google Messages. Availability is dependent on carrier activation.

Encrypted conversations are marked with a lock icon in the chat interface, an indicator Google Messages has used for some time and that now extends across platforms.

Encryption is enabled by default, and Apple has said it will be applied over time to both new and existing RCS threads.

A Cross-Platform First Built on MLS

The rollout implements the GSM Association’s (GMSA) RCS Universal Profile 3.0 specification, published in March 2025, which defined how to apply the IETF’s Messaging Layer Security (MLS) protocol within the RCS standard.

Until now, encryption protections in RCS had been limited to messages exchanged within a single client. Google Messages users had E2EE conversations with one another using the Signal protocol, but that protection did not extend to RCS threads with iPhone users.

iMessage, which Apple has noted remains E2EE by default between Apple devices, sat on a separate stack entirely.

In a statement, Alex Sinclair, Chief Technology Officer, GSMA, said, “We now encourage our members to leverage these new capabilities and enable more secure RCS messaging for personal and business users worldwide.”

Read more on Apple’s RCS encryption work: Apple Expands RCS Encryption and Memory Protections in iOS 26.4

Implications for Defenders and Smishing Operators

For information security teams, the change shifts the threat surface around mobile messaging in two directions at once.

Communications between an iPhone and an Android handset, previously transmitted with only transport-layer protections, will now be opaque to carriers and to any party intercepting traffic in transit.

The flip side is that carrier-level content inspection becomes harder. Analysts have noted that smishing is increasingly moving toward modern messaging channels such as RCS and iMessage, and E2EE is one factor that makes operator-level content filtering more difficult.

“Encrypted RCS is a real privacy win, and the cross-industry work with Google and the GSMA is the harder achievement worth acknowledging,” said Adam Boynton, senior enterprise strategy manager at Jamf, commenting on the news.

“[However,] impersonation is the fastest-growing threat on mobile. AI-cloned voices and deepfake messages can still bypass technical checks, so we’ve only secured the transit of messages, not the person on either end,” Boynton added.

The wider rollout to iPadOS, macOS and watchOS will follow in future software updates, Apple confirmed.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleProgress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass
Team-CWD
  • Website

Related Posts

News

Progress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass

May 12, 2026
News

Malicious Hugging Face Repository Typosquats OpenAI

May 12, 2026
News

AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE & More

May 12, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

AI-powered financial scams swamp social media

September 11, 2025

What is it, and how do I get it off my device?

September 11, 2025

How to mitigate the security and privacy risks of smart glasses

May 11, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.