❌

Normal view

The MacRumors Show: Apple Announces WWDC 2026

On this week's episode of The MacRumors Show, we discuss Apple's announcement of its 37th annual Worldwide Developers Conference (WWDC), where the company is expected to unveil a major Siri overhaul alongside iOS 27, macOS 27, and other next-generation operating systems.



Like last year, WWDC 2026 will be a primarily online event open to all developers at no cost, with an in-person component at Apple Park in Cupertino reserved for developers and students selected through a random lottery. Apple will notify accepted in-person attendees on April 2. The keynote and all sessions will be available on the Apple Developer app, Apple's website, and YouTube, with over 100 video sessions and interactive labs with Apple engineers and designers planned across the week.

Apple first unveiled Apple Intelligence at WWDC 2024, promising a smarter Siri with personal context, on-screen awareness, and deeper app integration, features that were delayed in March 2025, delayed again at WWDC 2025, and then missed a further internal target of iOS 26.4. Apple confirmed in its announcement that the conference will "spotlight incredible updates for Apple platforms, including AI advancements and exciting new software and developer tools," which points clearly to what is shaping up to be the most consequential β€ŒSiriβ€Œ update ever.

The revamped β€ŒSiriβ€Œ is said to be a sweeping redesign that turns Apple's long-struggling assistant into a full AI chatbot, with Bloomberg's Mark Gurman reporting that Apple is testing a standalone β€ŒSiriβ€Œ app displaying prior conversations in a list or grid, with pinned and searchable chats and iMessage-style chat bubbles. β€ŒSiriβ€Œ is also said to be gaining Dynamic Island integration, with a glowing icon and "searching" label while processing requests, an "Ask β€ŒSiriβ€Œ" button in third-party app menus, and a "Write with β€ŒSiriβ€Œ" keyboard option, while Spotlight is expected to be replaced by β€ŒSiriβ€Œ as the primary search interface on iPhone.

The technology underpinning virtually all of this comes from Apple's multi-year partnership with Google, under which next-generation Apple Foundation Models are based on Gemini, with processing continuing to run on-device and in Private Cloud Compute. Separately, Apple plans to open Siri to third-party AI chatbots in β€ŒiOS 27β€Œ via an "Extensions" system in Settings, ending OpenAI's exclusive arrangement and allowing users to direct queries to Claude, Gemini, Grok, and others.

Beyond β€ŒSiriβ€Œ, iOS 27 is expected to be a relatively lean update, described as a "Snow Leopard" year, focused on performance improvements, bug fixes, and code cleanup rather than major new feature additions. Notable exceptions include optimizations for Apple's first foldable iPhone, which is expected to launch in the fall, and new satellite connectivity features.

macOS 27 will apparently share the same β€ŒSiriβ€Œ upgrades and "Snow Leopard" stability focus. It will drop support for Intel-based Macs entirely. Apple will also unveil iPadOS 27, watchOS 27, tvOS 27, and visionOS 27 at the keynote. The MacRumors Show has its own YouTube channel, so make sure you're subscribed to keep up with new episodes and clips.



You can also listen to β€ŒThe MacRumors Showβ€Œ on Apple Podcasts, Spotify, Overcast, or other podcast apps. You can also copy our RSS feed directly into your player.



If you haven't already listened to the previous episode of The MacRumors Show, catch up to hear our discussion about Apple's surprise AirPods Max 2 announcement.

Subscribe to β€ŒThe MacRumors Showβ€Œ for new episodes every week, where we discuss some of the topical news breaking here on MacRumors, often joined by interesting guests such as Kayci Lacob, Kevin Nether, John Gruber, Mark Gurman, Jon Prosser, Luke Miani, Matthew Cassinelli, Brian Tong, Quinn Nelson, Jared Nelson, Eli Hodapp, Mike Bell, Sara Dietschy, iJustine, Jon Rettinger, Andru Edwards, Arnold Kim, Ben Sullins, Marcus Kane, Christopher Lawley, Frank McShan, David Lewis, Tyler Stalman, Sam Kohl, Federico Viticci, Thomas Frank, Jonathan Morrison, Ross Young, Ian Zelbo, and Rene Ritchie.

β€ŒThe MacRumors Showβ€Œ is on X @MacRumorsShow, so be sure to give us a follow to keep up with the podcast. You can also email us at podcast@macrumors.com or head over to The MacRumors Show forum thread. Remember to rate and review the podcast, and let us know what subjects and guests you would like to see in the future.
Related Roundup: WWDC 2026

This article, "The MacRumors Show: Apple Announces WWDC 2026" first appeared on MacRumors.com

Discuss this article in our forums

Apple Says No iPhone in Lockdown Mode Has Ever Been Hacked

Apple says it has no record of a successful spyware attack against any device running Lockdown Mode, the opt-in security feature it introduced in 2022.


"We are not aware of any successful mercenary spyware attacks against a Lockdown Mode-enabled Apple device," an Apple spokesperson told TechCrunch.

Lockdown Mode is available on the iPhone, iPad, and Mac, and dramatically restricts certain system features that are commonly exploited by mercenary spyware. When enabled, it blocks most message attachment types, disables certain complex web technologies, and prevents devices from automatically joining non-secure Wi-Fi networks, among other restrictions. Apple designed the feature specifically to protect high-risk users such as journalists, activists, lawyers, and others who may be personally targeted by sophisticated nation-state-level attacks.



Donncha Γ“ Cearbhaill, head of the security lab at Amnesty International, said he and his colleagues "have not seen any evidence of an iPhone being successfully compromised by mercenary spyware where Lockdown Mode was enabled at the time of the attack." Digital rights organizations including Amnesty International and the University of Toronto's Citizen Lab have documented numerous successful spyware attacks on iPhone users over the years, but none have involved a bypass of Lockdown Mode.

Citizen Lab researchers have confirmed at least two cases where Lockdown Mode actively blocked spyware attacks, with one involving NSO Group's Pegasus and another involving Predator spyware, made by a company now part of Intellexa. Google researchers found that spyware was coded to abort its infection attempt if it detected Lockdown Mode was active, apparently to avoid leaving traces that could expose the attack.

Patrick Wardle, an Apple cybersecurity expert, told TechCrunch, "I think it's safe to say, Lockdown Mode is one of the most aggressive consumer-facing hardening features ever shipped."
This article, "Apple Says No iPhone in Lockdown Mode Has Ever Been Hacked" first appeared on MacRumors.com

Discuss this article in our forums

Apple Now Sending Critical Security Alerts to iPhones Running iOS 17 and Earlier

Apple has begun pushing Lock Screen notifications to iPhones and iPads running older versions of iOS and iPadOS, warning users of active web-based attacks.


The alerts, which appear as a "Critical Software" notification from the Settings app, warn that Apple "is aware of attacks targeting out-of-date iOS software, including the version on your iPhone," and urge users to install a critical update to protect their device. The notifications are being seen on devices running a range of older iOS versions, including iOS 17.0, far beyond the iOS 13 and iOS 14 devices that Apple specifically flagged in its support documentation.

In the documentation, Apple highlighted recent reports about hacking tools that are effective against older versions of iOS. Hackers are using iOS exploit kits known as "Coruna" and "DarkSword," which can take advantage of vulnerabilities in iOS 13 through to iOS 17.2.1. Clicking a malicious link or visiting a compromised website on an unpatched device could result in data being stolen.

"If your iPhone doesn't have the latest software, update iOS to protect your data," Apple says. Users can update by going to Settings, General, and Software Update.

Apple released iOS 15.8.7 and iOS 16.7.15, along with corresponding iPadOS versions, on March 11 to address security vulnerabilities associated with the Coruna exploit kit. Devices running the latest updated versions of iOS 15 through iOS 26 are already protected, while devices on iOS 13 or iOS 14 must update to iOS 15 to receive these protections.

Apple has patched the vulnerabilities as they have come to light over the last several months, so users who have already upgraded to the newest version of iOS available for their iPhone are protected from the malicious websites and links that are circulating right now. Apple Safe Browsing in Safari is enabled by default and blocks the malicious URL domains identified in the attacks.

Users who are unable to update should consider enabling Lockdown Mode, if available, to protect against malicious web content. Lockdown Mode is available on iOS 16 and later.
Related Forums: iOS 17, iPadOS 17, iOS 15, iOS 16

This article, "Apple Now Sending Critical Security Alerts to iPhones Running iOS 17 and Earlier" first appeared on MacRumors.com

Discuss this article in our forums

❌