
iOS 26: The Apple update everyone will be talking about this year
From sleek aesthetics to smarter tools, this is Apple at its most innovative.
Apple just unveiled iOS 26, but unlike the company's usual annual update, this is a full-blown reimagining of how your iPhone works, looks, and learns. Aligning the name with the year, iOS 26 arrives with a suite of intelligent upgrades and futuristic features designed to make everyday tasks smoother and smarter. Here's why it's turning heads.
Liquid Glass design
Apple introduces its most visually stunning interface yet with Liquid Glass. The design brings a fresh, translucent aesthetic to your iPhone and iPad, responding to your surroundings and making app icons and widgets more dynamic than before. If you remember changing the themes on your Nokia phones back in the day, this is precisely that — except there are no sketchy downloads required.
Apple Intelligence
After teasing it in earlier updates, Apple Intelligence now makes its official debut, and it's built right into the fabric of your apps. Need to summarise a long email or polish a clunky message? Done. This AI-powered assistant enhances everything from writing and editing to search and scheduling, quietly doing the heavy lifting behind the scenes.
Visual Intelligence
Your iPhone now understands the context of what's on your screen. Looking at a party invite? Visual Intelligence will suggest adding it to your calendar. Shopping online? It may pull up related offers. It's an innovative and seamless addition to iOS 26, designed to save you time without breaking your flow.
Live Translation
Whether you're FaceTiming a friend in Paris or chatting with a colleague in Kyoto, Live Translation now works across Phone, FaceTime, and Messages. It translates spoken or written language in real-time, making global conversations feel more natural and a lot less awkward.
Smarter messages
Say goodbye to chaotic group messages. iOS 26 introduces polls directly into the Messages app, allowing friends to vote on plans without the need for back-and-forth. Apple Intelligence will even suggest a poll when it detects you're organising a meetup. Smart, social, and seriously convenient.
Phone screening
No more answering awkward, unknown numbers. Call Screening gives you a brief on who's calling and why — before you pick up. It works alongside Voicemail, so you can follow up at your leisure, without the pressure.
Upgraded maps
If you've ever forgotten the name of the Karak spot you stumbled upon a month ago, fret not. With the new Visited Places feature in Maps, your iPhone privately logs all the places you've been to so you can revisit them later.
And that's not all. iOS 26 brings Genmoji, which lets you create custom emojis based on prompts, Lyrics Translation and AutoMix in Apple Music, upgraded CarPlay, a sharper Wallet, and a fun new AirPods selfie trigger so you can capture the moment hands-free.
iOS 26 is now available for developers, with a public beta scheduled to roll out next month. The full version is expected to launch this fall for iPhone 11 and later models, although Apple Intelligence features will be exclusive to newer models, such as the iPhone 15 Pro and beyond.
GO: Visit apple.com for more information.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Khaleej Times
an hour ago
- Khaleej Times
Apple executives held internal talks about buying Perplexity: Reports
Apple executives have held internal talks about potentially bidding for artificial intelligence startup Perplexity, Bloomberg News reported on Friday, citing people with knowledge of the matter. The discussions are at an early stage and may not lead to an offer, the report said, adding that the tech behemoth's executives have not discussed a bid with Perplexity's management. "We have no knowledge of any current or future MA discussions involving Perplexity," Perplexity said in response to a Reuters' request for comment. Apple did not immediately respond to a Reuters' request for comment. Big tech companies are doubling down on investments to enhance AI capabilities and support growing demand for AI-powered services to maintain competitive leadership in the rapidly evolving tech landscape. Bloomberg News also reported on Friday that Meta Platforms tried to buy Perplexity earlier this year. Meta announced a $14.8 billion investment in Scale AI last week and hired Scale AI CEO Alexandr Wang to lead its new superintelligence unit. Adrian Perica, Apple's head of mergers and acquisitions, has weighed the idea with services chief Eddy Cue and top AI decision-makers, as per the report. The iPhone maker reportedly plans to integrate AI-driven search capabilities, such as Perplexity AI, into its Safari browser, potentially moving away from its longstanding partnership with Alphabet's Google. Banning Google from paying companies to make it their default search engine is one of the remedies proposed by the US Department of Justice to break up its dominance in online search. While traditional search engines such as Google still dominate global market share, AI-powered search options including Perplexity and ChatGPT are gaining prominence and seeing rising user adoption, especially among younger generations. Perplexity recently completed a funding round that valued it at $14 billion, Bloomberg News reported. A deal close to that would be Apple's largest acquisition so far. The Nvidia-backed startup provides AI search tools that deliver information summaries to users, similar to OpenAI's ChatGPT and Google's Gemini.


Khaleej Times
a day ago
- Khaleej Times
16 billion passwords leaked in largest data breach, find researchers
In what is being touted as the largest data breach ever, 16 billion login credentials were found exposed. Researchers from Cybernews have discovered a number of supermassive datasets, with billions of login credentials. The findings were the result of an ongoing investigation that the team started at the beginning of 2025. So far, they've discovered 30 exposed datasets containing from tens of millions to over 3.5 billion records each. The leak includes billions of login credentials from social media, VPNs, developer portals and user accounts for all the major vendors. According to the report, most of the information followed a clear structure: URL, followed by login details and a password. They said that this is exactly how most modern infostealers – malicious software stealing sensitive information – collect data. Which services are affected? Researchers state that the the leak opened the door to 'pretty much any online service imaginable, from Apple, Facebook, and Google, to GitHub, Telegram, and various government services.' 'With over 16 billion login records exposed, cybercriminals now have unprecedented access to personal credentials that can be used for account takeover, identity theft, and highly targeted phishing' the researchers said. They emphasized that it is especially concerning alarming that these aren't just old breaches being recycled. 'This is fresh, weaponizable intelligence at scale,' researchers said. How can you protect yourself? The researchers say that maintaining basic cyber hygiene is essential. You can use a password manager to generate strong, unique passwords, and update them regularly. Users should also review their systems for infostealers, to avoid losing their data to attackers.


Arabian Post
2 days ago
- Arabian Post
Massive 16 Billion Credential Leak Exposes Global Risk
Security researchers have uncovered an enormous password cache comprising 16 billion unique login credentials spanning major platforms such as Apple, Facebook, Google, Telegram, GitHub, VPN services and even government portals—making it the largest credential leak known to date. These credentials were harvested via at least 30 substantial datasets, some containing up to 3.5 billion records, indicating multiple infostealer malware operations operating at a large scale during 2025. Researchers found that the leaked datasets were transiently exposed in unsecured Elasticsearch and object‑storage instances, allowing brief public access before being shut down. Structures within the datasets included URLs, usernames and passwords, often accompanied by metadata such as tokens or cookies—making them ripe for phishing, credential stuffing and account hijacking. Analysts emphasise that the data is not a collection of old, recycled breaches: most records appear freshly harvested, enabling cybercriminals to exploit current and valid credentials in automated attacks. As one expert warned: 'This is not just a leak – it's a blueprint for mass exploitation… fresh, weaponizable intelligence at scale'. ADVERTISEMENT Infostealer malware—distributed through phishing links, fake software and compromised websites—has evolved into a pervasive threat under the malware‑as‑a‑service model. Such malware silently extracts browser‑stored credentials, cookies and session tokens before packaging and selling dumps on underground markets. The consequences are widespread. Cybercriminals can initiate credential stuffing across hundreds of services; craft highly convincing phishing emails; and mount identity theft, ransomware and business‑email‑compromise attacks. Records tied to Apple, Google and Facebook enhance the ease and effectiveness of targeted campaigns. It remains unclear how many unique users are affected, as overlapping credentials are present across the datasets. With over 5.5 billion internet users worldwide, many may have multiple accounts compromised. Security experts recommend immediate action. Users should deploy password managers to generate and store unique, complex passwords; enable multi‑factor authentication where available; and transition to passkey-based login systems, especially offered by Apple, Google and Microsoft. Regular system scans for infostealer malware and the avoidance of downloading cracked or unauthorised software are also advised. Organisations are under pressure to strengthen internal cybersecurity measures, including enforcing MFA, conducting regular training on phishing awareness and credential hygiene, and adopting zero‑trust frameworks. Endpoint protection and proactive threat monitoring have become essential amid this evolving threat landscape.