New leaked photos show how unexpectedly different the new iPhone 17 might look
New phone, who's this?
Apple fanatics are counting down the days until the iPhone 17 is released later this year. Usually any major changes are kept tight-lipped until it gets closer — but a recent leak showed dramatic alterations to the new model.
A series of photos leaked on X showed metal 'dummy models' of what the iPhone 17's camera might potentially look like.
Each dummy model had a different camera design — one was vertical with two lenses and the other three had rectangular bars, with either one or three lenses.
Based on the photos, the mockups also varied in size, hinting that one model — which looks noticeably thinner — might be the iPhone Air.
People who hate stuffing a bulky phone into their pockets will be happy about this change. The Air — which is said to be replacing the iPhone Pro model — will reportedly be super thin measuring only 0.2-inches (5.5mm) wide and be very light.
According to Forbes, this model might have an Action Button rather than the Ring/Mute slider.
Before you refresh Apple's website for the iPhone 17 presale, this latest phone drop might have one of the most expensive models, according to Tech Radar.
Which one and how much? That info has yet been released, but it's assumed the Air will be the most affordable model.
As expected, people had a lot to say about this potential iPhone design change.
'There is no way a human being could like this camera design,' one comment read under the leaked photos on X.
Another person said, 'Hate the camera bump.'
'I'm not sure who Apple is making iPhones for anymore,' read another comment.
If your current iPhone needs an upgrade and you're saving your hard earned dollars for this iPhone drop, just be sure to treat your new phone with care — especially its battery life.
A phone's battery life does get worse as the years go on 'due to internal electrochemical wear and tear,' Sandeep Unnikrishnan, chief technology officer at battery tech start-up Lionvolt, explained to The Independent.
Phones batteries usually last between two to three years before its capacity significantly diminishes.
To avoid this from happening, make sure not to charge your phone to 100%, only charge it during the day so you can monitor it. Lastly, don't use your phone when it's charging because a phone's temperature plays a 'crucial role' in its battery life.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


TechCrunch
an hour ago
- TechCrunch
Why Danny Boyle shot ‘28 Years Later' with iPhones
In Brief Director Danny Boyle famously shot his post-apocalyptic classic '28 Days Later' on Canon digital cameras, making it easier for him to capture eerie scenes of an abandoned London, and giving the movie's fast-moving zombies a terrifying immediacy. To make his decades-later sequel '28 Years Later' (which opened this weekend), Boyle turned to a different piece of consumer tech — the iPhone. Boyle told Wired that by using a rig that could hold 20 iPhone Pro Max cameras, the filmmaking team created 'basically a poor man's bullet time,' capturing the brutal action scenes from a variety of angles. Even when he wasn't using the rig, Boyle (who once directed a biopic of Apple co-founder Steve Jobs) said the iPhone was the movie's 'principal camera,' albeit after disabling settings like automatic focus and adding special accessories. 'Filming with iPhones allowed us to move without huge amounts of equipment,' Boyle said, adding that the team was 'able to move quickly and lightly to areas of the countryside that we wanted to retain their lack of human imprint.'
Yahoo
2 hours ago
- Yahoo
Urgent alarm issued after ‘mother of all data breaches' sees 16 billion passwords exposed — do this ASAP
A staggering 16 billion login credentials — including usernames, emails, and passwords for Apple, Google, Facebook and more — have been leaked online, shocking cybersecurity researchers. The data even contained the credentials of government officials, posing security concerns. The compromised data was scraped from over 30 databases since the start of 2025 and likely stems from malicious 'infostealer' software designed to extract sensitive information from victims' devices, a report published by Cybernews reveals. The leaked credentials span nearly every type of online service imaginable from social media and email accounts to VPNs and developer platforms. "No stone was left unturned," the report warns. Thanks to Jeff Bezos, you can now become a landlord for as little as $100 — and no, you don't have to deal with tenants or fix freezers. Here's how I'm 49 years old and have nothing saved for retirement — what should I do? Don't panic. Here are 6 of the easiest ways you can catch up (and fast) Nervous about the stock market in 2025? Find out how you can access this $1B private real estate fund (with as little as $10) This breach isn't just about stolen email addresses, it's about what cybercriminals can do with your full login credentials — especially if you tend to use the same passwords across your different accounts. Once hackers get your email and password combo, they can launch a range of attacks, including: Credential stuffing: Hackers try your login across banking, streaming, shopping, or investment sites. If you reuse passwords, they could gain access to your most sensitive accounts. Phishing and social engineering: With access to personal details or email accounts, scammers can send convincing fake messages or impersonate you to friends, coworkers, or customer service agents. Identity theft: Stolen credentials can be used to open credit cards, apply for loans, or take over government benefit accounts in your name. Access to 2FA and backups: If hackers get into your email, they may intercept security codes, password reset links, or even gain access to your cloud storage and documents. Google, Facebook, Netflix, Apple, LinkedIn, Dropbox and PayPal are among the slew of accounts with data compromised meaning nearly every kind of online identity is at risk. Even worse: many of the stolen credentials are in plain text, making them incredibly easy to exploit with automated tools. While the current combination of credential data is new, some of the data could also be from previous data breaches, including a database containing 184 million records discovered back in May of this year. Read more: Want an extra $1,300,000 when you retire? Dave Ramsey says — and that 'anyone' can do it With billions of passwords out in the wild, here's how to stay one step ahead of hackers: Change your passwords — especially for email, banking and shopping accounts. If you reuse passwords, it's time to break the habit. Turn on 2FA — that's two-factor authentication. It adds a second layer of defense, and it's free on most platforms. Use a password manager — stop relying on your memory (or sticky notes). Let an encrypted vault generate strong passwords for you. This makes it easier to change your password frequently, too. Watch your inbox — phishing scams tend to spike after big breaches. Don't click suspicious links, even if they look legit. Most importantly, monitor any financial accounts you have closely. Think PayPal, bank accounts and credit cards etc. Check your statements and even pull a credit report from Equifax, Experian or Transunion. 'This is the mother of all data breaches,' Ed Peters, CEO of Data Discovery Sciences, said to NBC 5 DFW. 'We tend to think of a lone hacker going and stealing your data. That's not the case.' With cybercriminals sitting on a dragon's hoard of credentials, experts say the risks of account takeovers, phishing and fraud are higher than ever. Don't wait for a 'suspicious activity' email — lock it down now. Rich, young Americans are ditching the stormy stock market — here are the alternative assets they're banking on instead Robert Kiyosaki warns of a 'Greater Depression' coming to the US — with millions of Americans going poor. But he says these 2 'easy-money' assets will bring in 'great wealth'. How to get in now This tiny hot Costco item has skyrocketed 74% in price in under 2 years — but now the retail giant is restricting purchases. Here's how to buy the coveted asset in bulk Here are 5 'must have' items that Americans (almost) always overpay for — and very quickly regret. How many are hurting you? Like what you read? Join 200,000+ readers and get the best of Moneywise straight to your inbox every week. This article provides information only and should not be construed as advice. It is provided without warranty of any kind.


Forbes
2 hours ago
- Forbes
If You Get This Message From Apple Or Google, It's An Attack
Delete all these messages. There's nothing a cyber criminal likes more than highly publicized events, sudden fear and a sense or urgency. And so last week's headlines that 16 billion passwords leaked in the 'largest ever data breach' hit the jackpot. That this 'opened access' to Apple and Google accounts, the most prized of all, just made it all the sweeter. The fact there's no new data breach impacting Google or Apple or Microsoft or Facebook is beside the point. This is an amalgamation of various breaches, collecting data from multiple sources including infostealers on PCs. But users reading the headlines will not realize and will understandably panic. This highlights the weakness in using passwords to secure accounts. Despite what you've read, the answer is not to reset or change all your passwords. It's to enable two-factor authentication on all your key accounts — especially the likes of Apple, Google, Microsoft, Facebook and Amazon. Better still, switch to passkeys where you can. But many everyday users are now at risk from attacks, whether or not their user names and passwords were in any of those breached datasets. Attackers will now send out emails pretending to be from Apple, Google or other brands, warning of the breach and linking to the public headlines and password reset advice. And those emails or texts will helpfully include a password reset link or a helpline number to call. We've already seen multiple attacks on Apple and Google users, with fake support emails or calls or texts warning that accounts are compromised and passwords need to be reset. These recent headlines are a surprise gift to those attackers. And so, a timely reminder that no major tech brand — Google, Apple, Microsoft and Facebook included — will ever reach out to you about an account security problem or to reset a password. If you receive any such message or call, it's an attack. Period. Google has asked me in the past to 'please reiterate to your readers that Google will not contact you to reset your password or troubleshoot account issues.' The same is true for all those others. It never happens. As the FBI says, 'legitimate customer, security, or tech support companies will not initiate unsolicited contact with individuals." Even if a message is so plausible that you can't ignore it, you must still delete it and access your account using the usual means. Online or using your app. If there's a password issue you'll be directed to a reset option. There won't be. Similarly, if you receive a call or a message to call back, do not respond. Access your account as normal. Google and Apple account details are the most valuable, granting access to many apps and services and the mobile phones that control our lives. But treat any messages from Microsoft or Facebook or any other brand in the wake of this 'breach' the same way. The key advice — to add 2FA or passkeys — will protect you even if a breach is new. The final advice is to avoid SMS 2FA — use another method if you can.