logo
iOS 18 promised the biggest update in history — here's what iOS 26 needs to fix

iOS 18 promised the biggest update in history — here's what iOS 26 needs to fix

Tom's Guide08-06-2025

Apple's WWDC event is slated for next week, and there is a lot to be excited about. However, one of the most important announcements that we're expecting to see is the new iOS 26, which may also be called iOS 19.
Over the last few months, we've seen a lot of rumors and leaks about the upcoming update, with Bloomberg's Mark Gurman calling it one of the biggest overhauls in Apple's history.
However, the same thing was said about the last update.
When it was first announced, there was a lot of talk that iOS 18 was Apple's biggest update in history. Now, it wasn't strictly untrue, as iOS 18 held a lot of promise. However, there's no doubt that the actual release left a fair amount to be desired. So, if iOS 26 wants to be the biggest update ever, it needs to solve a few things.
There's no doubt that Apple Intelligence was the reason for the hype around iOS 18. However, while Apple's new AI promised the world, it left a lot to be desired, thanks to limited device support alongside delayed features. For instance, certain language support, priority notifications and more didn't launch until March of this year.
Now, in the interest of fairness, I will say that the features we have work just fine, but they're heavily limited. For instance, Apple's Image Playground has an irritating UI that's more annoying than revolutionary. Added to this is the simple fact that you can't create anything novel or interesting without a lot of work. If we compare this to the other options, then you see the issue.
This is a problem that runs the gamut of AI features for Apple Intelligence: there are simply better options out there. I would have thought that Apple would have some of the best features available, it's what the company is known for, after all. As such, I would want to see iOS 26 push these features to their limits, but I also want Apple to be realistic, rather than promising the world and not delivering.
When it comes to missing features, there's no greater culprit than the long-awaited"Siri 2.0." Apple has been working on an improved AI assistant for a while now, but has reportedly only managed to get Siri 2.0 to work "two-thirds of the time."
This is an issue because AI Assistants have slowly become an integral part of phones, yet Apple is continuing to fall behind the competition. That isn't to say the current iteration is useless, though, as Siri can manage a lot of your basic tasks. The issue is that it fails in comparison to what assistants like Google Gemini offer.
However, considering all we've heard about Siri 2.0, that could change so long as Apple releases it with iOS 26. While we don't know all the features that are coming with the improved Siri, we do have some idea about the core functions. Reportedly, the new Siri offers more personal context, onscreen awareness and deeper app integration. Hopefully, Apple uses WWDC 2025 to give Apple fans the software they deserve.
Of course, it isn't just Apple intelligence that needs solving, as one thing that I found to be severely lacking with iOS 18 was the (apparently) improved look of the homescreen and menus. Again, in the interest of fairness, I don't want to imply that the update was awful; it just wasn't all that interesting. For instance, the ability to tint app icons was underwhelming at best, ugly at worst.
We do know that Apple is possibly planning a pretty major improvement with the so-called Project Solarium, although what this will contain is up for debate. For instance, we've seen several reports that Apple will completely overhaul the look of the UI with designs similar to Apple's VisionOS. Alternatively, one of the more interesting designs we've seen comes from a series of mock-ups from noted tech leaker Jon Prosser, which were posted on his Front Page Tech YouTube channel.
While this might not be the exact look of iOS 26, it's certainly more notable and striking than what iOS 18 gave us. Making the icons more circular helps them to look cleaner, while the transparent menus make it all seem more futuristic. This has two advantages: the first is that it makes the look of the screen memorable, while the second allows Apple to be more distinct when compared with Android
The video also helps to show off how we could control our phones, and they all look pretty great. For instance, the search bar appearing at the bottom of the screen is a nice touch. Not only that, the menus offering a more distinct swiping animation, as well as highlighting which tab you're on, will be a draw for many. This is the kind of change that we need to see from Apple, and it's one I hope iOS 26 brings.
At the end of the day, we can't know for certain what Apple will announce, and the company is well known for being tight-lipped in the run-up to release. For instance, one of the big questions at the moment is whether Apple will even focus on AI for the presentation. In one recent report, Mark Gurman stated that it was possible Apple would avoid AI entirely, so it isn't impossible.
However, I hope that, even if Apple doesn't directly mention it, iOS 26 will at least solve some of the issues I've discussed. If Apple does try to quietly sweep it under the rug and ignore what it needs to solve, that might be interesting to watch, too.
On that note, what are you hoping to see during WWDC, and what would you like to see from Apple regarding iOS 26?

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Why Danny Boyle shot ‘28 Years Later' with iPhones
Why Danny Boyle shot ‘28 Years Later' with iPhones

TechCrunch

time41 minutes ago

  • TechCrunch

Why Danny Boyle shot ‘28 Years Later' with iPhones

In Brief Director Danny Boyle famously shot his post-apocalyptic classic '28 Days Later' on Canon digital cameras, making it easier for him to capture eerie scenes of an abandoned London, and giving the movie's fast-moving zombies a terrifying immediacy. To make his decades-later sequel '28 Years Later' (which opened this weekend), Boyle turned to a different piece of consumer tech — the iPhone. Boyle told Wired that by using a rig that could hold 20 iPhone Pro Max cameras, the filmmaking team created 'basically a poor man's bullet time,' capturing the brutal action scenes from a variety of angles. Even when he wasn't using the rig, Boyle (who once directed a biopic of Apple co-founder Steve Jobs) said the iPhone was the movie's 'principal camera,' albeit after disabling settings like automatic focus and adding special accessories. 'Filming with iPhones allowed us to move without huge amounts of equipment,' Boyle said, adding that the team was 'able to move quickly and lightly to areas of the countryside that we wanted to retain their lack of human imprint.'

Urgent alarm issued after ‘mother of all data breaches' sees 16 billion passwords exposed — do this ASAP
Urgent alarm issued after ‘mother of all data breaches' sees 16 billion passwords exposed — do this ASAP

Yahoo

time2 hours ago

  • Yahoo

Urgent alarm issued after ‘mother of all data breaches' sees 16 billion passwords exposed — do this ASAP

A staggering 16 billion login credentials — including usernames, emails, and passwords for Apple, Google, Facebook and more — have been leaked online, shocking cybersecurity researchers. The data even contained the credentials of government officials, posing security concerns. The compromised data was scraped from over 30 databases since the start of 2025 and likely stems from malicious 'infostealer' software designed to extract sensitive information from victims' devices, a report published by Cybernews reveals. The leaked credentials span nearly every type of online service imaginable from social media and email accounts to VPNs and developer platforms. "No stone was left unturned," the report warns. Thanks to Jeff Bezos, you can now become a landlord for as little as $100 — and no, you don't have to deal with tenants or fix freezers. Here's how I'm 49 years old and have nothing saved for retirement — what should I do? Don't panic. Here are 6 of the easiest ways you can catch up (and fast) Nervous about the stock market in 2025? Find out how you can access this $1B private real estate fund (with as little as $10) This breach isn't just about stolen email addresses, it's about what cybercriminals can do with your full login credentials — especially if you tend to use the same passwords across your different accounts. Once hackers get your email and password combo, they can launch a range of attacks, including: Credential stuffing: Hackers try your login across banking, streaming, shopping, or investment sites. If you reuse passwords, they could gain access to your most sensitive accounts. Phishing and social engineering: With access to personal details or email accounts, scammers can send convincing fake messages or impersonate you to friends, coworkers, or customer service agents. Identity theft: Stolen credentials can be used to open credit cards, apply for loans, or take over government benefit accounts in your name. Access to 2FA and backups: If hackers get into your email, they may intercept security codes, password reset links, or even gain access to your cloud storage and documents. Google, Facebook, Netflix, Apple, LinkedIn, Dropbox and PayPal are among the slew of accounts with data compromised meaning nearly every kind of online identity is at risk. Even worse: many of the stolen credentials are in plain text, making them incredibly easy to exploit with automated tools. While the current combination of credential data is new, some of the data could also be from previous data breaches, including a database containing 184 million records discovered back in May of this year. Read more: Want an extra $1,300,000 when you retire? Dave Ramsey says — and that 'anyone' can do it With billions of passwords out in the wild, here's how to stay one step ahead of hackers: Change your passwords — especially for email, banking and shopping accounts. If you reuse passwords, it's time to break the habit. Turn on 2FA — that's two-factor authentication. It adds a second layer of defense, and it's free on most platforms. Use a password manager — stop relying on your memory (or sticky notes). Let an encrypted vault generate strong passwords for you. This makes it easier to change your password frequently, too. Watch your inbox — phishing scams tend to spike after big breaches. Don't click suspicious links, even if they look legit. Most importantly, monitor any financial accounts you have closely. Think PayPal, bank accounts and credit cards etc. Check your statements and even pull a credit report from Equifax, Experian or Transunion. 'This is the mother of all data breaches,' Ed Peters, CEO of Data Discovery Sciences, said to NBC 5 DFW. 'We tend to think of a lone hacker going and stealing your data. That's not the case.' With cybercriminals sitting on a dragon's hoard of credentials, experts say the risks of account takeovers, phishing and fraud are higher than ever. Don't wait for a 'suspicious activity' email — lock it down now. Rich, young Americans are ditching the stormy stock market — here are the alternative assets they're banking on instead Robert Kiyosaki warns of a 'Greater Depression' coming to the US — with millions of Americans going poor. But he says these 2 'easy-money' assets will bring in 'great wealth'. How to get in now This tiny hot Costco item has skyrocketed 74% in price in under 2 years — but now the retail giant is restricting purchases. Here's how to buy the coveted asset in bulk Here are 5 'must have' items that Americans (almost) always overpay for — and very quickly regret. How many are hurting you? Like what you read? Join 200,000+ readers and get the best of Moneywise straight to your inbox every week. This article provides information only and should not be construed as advice. It is provided without warranty of any kind.

If You Get This Message From Apple Or Google, It's An Attack
If You Get This Message From Apple Or Google, It's An Attack

Forbes

time2 hours ago

  • Forbes

If You Get This Message From Apple Or Google, It's An Attack

Delete all these messages. There's nothing a cyber criminal likes more than highly publicized events, sudden fear and a sense or urgency. And so last week's headlines that 16 billion passwords leaked in the 'largest ever data breach' hit the jackpot. That this 'opened access' to Apple and Google accounts, the most prized of all, just made it all the sweeter. The fact there's no new data breach impacting Google or Apple or Microsoft or Facebook is beside the point. This is an amalgamation of various breaches, collecting data from multiple sources including infostealers on PCs. But users reading the headlines will not realize and will understandably panic. This highlights the weakness in using passwords to secure accounts. Despite what you've read, the answer is not to reset or change all your passwords. It's to enable two-factor authentication on all your key accounts — especially the likes of Apple, Google, Microsoft, Facebook and Amazon. Better still, switch to passkeys where you can. But many everyday users are now at risk from attacks, whether or not their user names and passwords were in any of those breached datasets. Attackers will now send out emails pretending to be from Apple, Google or other brands, warning of the breach and linking to the public headlines and password reset advice. And those emails or texts will helpfully include a password reset link or a helpline number to call. We've already seen multiple attacks on Apple and Google users, with fake support emails or calls or texts warning that accounts are compromised and passwords need to be reset. These recent headlines are a surprise gift to those attackers. And so, a timely reminder that no major tech brand — Google, Apple, Microsoft and Facebook included — will ever reach out to you about an account security problem or to reset a password. If you receive any such message or call, it's an attack. Period. Google has asked me in the past to 'please reiterate to your readers that Google will not contact you to reset your password or troubleshoot account issues.' The same is true for all those others. It never happens. As the FBI says, 'legitimate customer, security, or tech support companies will not initiate unsolicited contact with individuals." Even if a message is so plausible that you can't ignore it, you must still delete it and access your account using the usual means. Online or using your app. If there's a password issue you'll be directed to a reset option. There won't be. Similarly, if you receive a call or a message to call back, do not respond. Access your account as normal. Google and Apple account details are the most valuable, granting access to many apps and services and the mobile phones that control our lives. But treat any messages from Microsoft or Facebook or any other brand in the wake of this 'breach' the same way. The key advice — to add 2FA or passkeys — will protect you even if a breach is new. The final advice is to avoid SMS 2FA — use another method if you can.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store