Forget iOS 19, your next iPhone update could be iOS 26 as Apple plans major OS overhaul
Tech giant and iPhone maker Apple Inc. plans to rebrand its operating system names across devices starting from the next update, Bloomberg reported citing a source.
The company is likely to make this announcement at the coming Worldwide Developers Conference (WWDC) on June 9, it added.
A spokesperson for Apple decline to comment, as per the report. As per the report, this is among 'the most sweeping change yet' to Apple's operating system names, adn will extend to all its devices.
What is the change? From the next update onwards, iOS will be identifed by year, rather than the version number, the source told Bloomberg.
How will this look? For user, the current iOS18 will be succeeded by the iOS26 on iPhones. The same is applicable on all Apple devices — iPadOS 26, macOS 26, watchOS 26, tvOS 26 and visionOS 26, they added.
Why the change? The report said that this comes as a way to 'bring consistency to branding and move away from an approach that can be confusing to customers and developers'. At present, all devices have differently named OS — i.e. iOS 18, watchOS 12, macOS 15 and visionOS 2, due to their different debut times.
Besides the name change, the new OS promises a fresh user interface across devices — an attempt to bring users 'a more cohesive experience'. Internally, this is being called 'Solarium', and will include tvOS, watchOS and parts of visionOS, as per another Bloomberg report. Other design features include giving the iPad 'a more Mac-like experience' and likely branding it for office use, the report added.
Further, Apple will open up its AI models to third-party developers, letting them tap into the underlying technology used by the Apple Intelligence platform.
Other new features coming this year include a live-translation mode for AirPods and the Siri voice assistant, as well as an eye-scrolling option on the Vision Pro headset.
On the AI side, Apple is planning health features and an AI-enabled battery management mode.
There also will be a new bidirectional Arabic and English keyboard, a digital calligraphy pen for Apple Pencil users and a new app for gaming on Apple devices.
The report noted that similar rebranding strategies were undertaken by rivals Samsung Electronics Co. and Microsoft Corp. in the past.
In 2020, Samsung renamed its flagship Galaxy S phone line to reflect its year of launch — i.e. the Galaxy S20. Its predecessor, which debuted in 2019, was the Galaxy S10 (10th generation).
In 1995, Microsoft shifted to naming major operating systems after the year of launch, which means Windows 2000 followed the Windows 98, which came after the Windows 95.
The small difference is that Apple will use the coming year, instead of the ongoing one — iOS 26 (not iOS 25) despite launching in September 2025.
(With inputs from Bloomberg)

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Time of India
2 hours ago
- Time of India
Urgent cyber warning for Americans: 184 million passwords leaked; are you at risk
Urgent cyber warning for Americans: 184 million passwords leaked; are you at risk In one of the most alarming cybersecurity revelations of the decade, a massive data leak has exposed over 184 million records, including emails, passwords, and login links — all stored in plain text — according to a new report by Wired. The shocking discovery was made by cybersecurity expert Jeremiah Fowler, who found the unprotected database freely accessible online. Unlike other breaches that require decryption or advanced hacking to exploit, this leak is disturbingly simple to misuse. Fowler described it as a "cybercriminal's dream working list", highlighting the ease with which threat actors can now gain direct access to accounts tied to major companies like Apple, Google, Facebook, Microsoft, and even banks and government agencies. As cyberattacks evolve and cloud storage becomes more prevalent, this breach signals a growing vulnerability in the digital lives of millions of Americans. The consequences include identity theft , financial fraud, and account takeovers, unless urgent action is taken. Here's everything you need to know about the breach, why it's different from previous ones, and what steps you should take today to protect yourself. 184 million passwords leaked in massive data breach: A wake-up call for every American According to Fowler's report, the database contained: by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Create Your Store Website & Sell Online with Shopify Shopify Shop Now Undo Email addresses Account passwords (in plain text — not encrypted) Direct login links to various platforms These details were exposed without any authentication protection and were accessible by anyone with a web browser. What makes this breach uniquely dangerous is that login links can often bypass traditional username and password entries, giving hackers one-click access to user accounts. Apple, Google, Facebook logins exposed in massive data leak Although the database itself wasn't tied to a specific company, cross-referenced data revealed leaked credentials linked to: Apple iCloud and iTunes services Google accounts, including Gmail and Drive Facebook and Instagram logins Microsoft Outlook, Teams, and Office 365 accounts Banking portals Government service platforms E-commerce platforms and crypto wallets The presence of login links for services with sensitive financial, personal, and professional data is a glaring red flag. Why this leak is more dangerous than usual: No encryption, no limits Many past breaches involved hashed or encrypted passwords, making them harder to exploit. This one, however, included fully readable login credentials, making it immediately usable by cybercriminals . Worse still, login URLs in the dataset could allow attackers to bypass security protocols altogether. Jeremiah Fowler noted that this was not a theoretical threat but a practical toolkit for fraudsters. The plain-text nature of the data drastically reduces the technical skill required to launch credential stuffing attacks, identity fraud, and phishing campaigns. IBM warns: Misconfigured clouds behind 82% of data breaches The rise in such breaches has been directly tied to the explosion of cloud services like Amazon Web Services (AWS), Google Cloud, and Microsoft Azure. These platforms offer cost efficiency and scalability, but they also create centralized attack surfaces. An IBM report cited by The Wall Street Journal revealed that 82% of breaches in the past year involved data stored on the cloud, with misconfigured servers and public storage buckets often being the weak link. Data breach victims skyrocket 312% in 2024: What you need to know The problem is escalating. In 2023, the number of data breaches rose by 72%, affecting over 353 million people, according to cybersecurity analysts. But 2024 has seen an even more disturbing trend: while the number of breaches remained high, the number of individuals affected skyrocketed by 312% — largely due to mega-breaches like this one. Adding to the concern is a recent case involving Coinbase, the crypto exchange giant. On May 11, 2024, support agents based overseas were allegedly bribed by hackers to gain access to customer data. Although Coinbase refused to pay ransom, the breach could result in damages exceeding $400 million, highlighting how human vulnerabilities compound technical flaws. Data breach warning: Essential security tips every American needs today In the face of this breach, experts urge Americans to take immediate steps to secure their digital identities. Here are critical actions recommended by cybersecurity professionals and financial watchdogs: 1. Change your passwords — All of them Use unique passwords for every account. Make them long, complex, and include numbers, symbols, and both upper and lower case letters. Avoid reusing passwords or slight variations across websites. 2. Enable multi-factor authentication (MFA) Always turn on two-factor authentication (2FA) or multi-factor authentication for important accounts, especially banking, email, and social media. 3. Freeze your credit Contact the three major credit bureaus — Equifax, Experian, and TransUnion — to freeze your credit. This will prevent new accounts from being opened in your name and doesn't affect your credit score. 4. Check if your info was compromised Use tools like Google's Password Checkup or to verify whether your login credentials have been leaked in known data dumps. 5. Update contact information Ensure your email addresses and phone numbers linked to bank accounts and e-commerce profiles are current. This ensures you receive alerts in case of suspicious activity. 6. Set up transaction alerts Most banks and credit cards allow you to receive real-time alerts for every transaction. This makes it easier to spot fraud early. Also read | Airtel recharge plans | Jio recharge plans | BSNL recharge plans AI Masterclass for Students. Upskill Young Ones Today!– Join Now


Economic Times
3 hours ago
- Economic Times
WhatsApp shutting down permanently on these iPhones and Android devices. Is your phone on the list?
WhatsApp discontinues service for devices running iOS 15 or Android 5.0 and below. WhatsApp will stop functioning on a number of older smartphones as part of its routine software update cycle beginning Sunday, June 1, 2025. The update, initially expected on May 5, was delayed to allow users more time to prepare. The Meta-owned messaging platform has raised its minimum operating system requirements, resulting in the end of support for devices that can no longer meet these continue using WhatsApp, iPhones must now be running iOS 15.1 or later, while Android devices must operate on Android 5.1 or newer. Devices that fall short of these criteria will lose access to the app's messaging and calling services. Several older Apple and Android devices will be impacted. The following iPhone models are confirmed to be incompatible with the new version of WhatsApp: iPhone 5s iPhone 6 iPhone 6 Plus Additional models such as the iPhone 6s, iPhone 6s Plus, and iPhone SE (1st generation) have also been mentioned in some reports. However, these devices are capable of running iOS 15.8.4, which means they remain compatible for the time being. Samsung Galaxy S4 Samsung Galaxy Note 3 Sony Xperia Z1 LG G2 Huawei Ascend P6 Moto G (1st Gen) Motorola Razr HD Moto E (2014) HTC One X Samsung Galaxy S3 Any device running Android 5.0 or earlier is no longer supported due to the new minimum requirement of Android routinely updates its software to utilize newer system capabilities, enhance app performance, and improve security measures. As operating systems and hardware age, they become unable to support advanced features like end-to-end encryption, video calling, and improved user interface options. Discontinuing support for outdated systems ensures WhatsApp can deliver a consistent and secure experience to its user base, which exceeds 3 billion remains a major concern. Older devices no longer receive updates from manufacturers like Apple and Google, leaving them vulnerable to security risks. WhatsApp has emphasized the need to use newer devices to maintain strong protection for personal users with devices listed above, several options are available: Upgrade the Device: Buying a new phone that supports iOS 15.1 or Android 5.1 (or higher) is the most reliable way to continue using WhatsApp. Update the Software: For users with iPhone 6s, 6s Plus, or SE (1st gen), updating to iOS 15.8.4 will maintain compatibility for now. Switch to Alternatives: Apps like Telegram and Signal may still function on older systems, though their feature sets and user bases differ. Back Up Chats: Before support ends, users are advised to back up their chat history. On iPhones, this can be done via iCloud; Android users can use Google Drive. To do so, go to Settings > Chats > Chat Backup within the WhatsApp app. According to data from Apple in 2024, only about 5% of active iPhones are still running iOS 15 or earlier, suggesting that the change will affect a relatively small portion of users, particularly in developed markets. However, in regions with slower device turnover, the impact may be more more information, users can visit WhatsApp's official support page or check their phone's software version under Settings.


Mint
4 hours ago
- Mint
Southeast Asia Joins Europe's Calls to Defend Subsea Cables
(Bloomberg) -- Defense officials from Europe and Southeast Asia called for stronger collaboration to protect the global network of subsea cables as concerns grow over threats to this vital infrastructure. Countries like Singapore and Malaysia are becoming key hubs for the roughly 600 fiber-optic cables that carry nearly all of the world's data. Meanwhile, a spike in cable damage in European waters, particularly in the Baltic Sea, has heightened fears about the network's vulnerability. 'We need to work together to defend the entire network,' Singapore Defense Minister Chan Chun Sing said at the IISS Shangri-La Dialogue security forum on Sunday. 'There's no point trying to defend the integrity and security of a submarine cable by looking at a point. We need both ends to be secure.' The issue came up repeatedly during the two-day summit in Singapore, with European officials keen to share what they've learned from the recent rise in subsea cable damage. Today, the global undersea cable network stretches about 1.4 million kilometers (870,000 miles). With the demand for data center power projected to surge significantly with the advent of intensive AI platforms, more cables are essential. Protecting them has become a key imperative in Europe since Russia's full-scale invasion of Ukraine, with incidents in its waters mostly involving tankers traveling to and from Russia, and in at least one case, a Chinese vessel. Despite suspicions of sabotage, there's been no strong evidence pointing to deliberate attacks, with the incidents more likely to be accidents or careless behavior. Still, NATO countries have increased patrols in key areas to ensure the safety of undersea infrastructure. The European Union's top diplomat Kaja Kallas urged European and Asian partners to work together at sea to tackle covert 'shadow fleets' of tankers and review maritime security laws. Protecting digital cable infrastructure is important for the Philippines too, Defense Secretary Gilberto Teodoro said in an interview. He added that his country, which is locked in a long-running dispute with China in the South China Sea, is working to build up its capabilities to address the threat. Thailand also called the issue a pressing concern, with Defense Minister Phumtham Wechayachai saying the country is collaborating with Singapore and Brunei. He added undersea infrastructure faces risks not only from sabotage, but also from accidents and natural disasters. More stories like this are available on