Apple is offering some great deals on new Macs during the Back to School period. If you’re looking to buy a new Mac for school, college or university then there are some pretty good offers. And they’re available for teachers and other staff, too.
Shop at the Apple Store for Education and you can save up to £270 on a new Mac, and up to £59 on a new iPad.
You can trade in your current Mac and get up to £845 for your current one.
Education pricing is available to current and newly accepted university students, parents buying for university students, and teachers and staff at all levels.
For UK students, check out the Students in the US should visit
Make sure you bookmark our and pages for later in the year!
Get free Beats headphones
Students can also get a free set of Beats wireless headphones when you buy any new MacBook, the iMac or Mac Pro (don’t buy the Mac Pro as it’s getting replaced soon).
The 10.5-inch and 12.9-inch iPad Pro models are also included in the free Beats deal.
You can choose from the Beats X, Beats Solo3, or Powerbeats3 headphones.
Students in the US should visit For UK students, check out the
Today’s best Beats X, Beats Solo 3 Wireless and Beats Powerbeats 3 deals
Beats Solo 3 Wireless
We check over 130 million products every day for the best pricesVIEW ALL DEALS
Example Back to School Mac deals
There are plenty of deals to be had. For example, a MacBook that costs $1,299 is available for $1,249 (with a free pair of Beats headphones) for students. In the UK you could pay £772.80 for a MacBook that usually costs £899.
If you’re after an iPad, the iPad Pro can be bought with a student discount, with prices starting at /£522/. Meanwhile, the entry-level new iPad is available to students for /£321.60/.
For the MacBook Pro, the prices start at /£1124.40/.
For UK students you can get a for £854.40, down from £949 and in the US you can get a For Australians, the .
Make sure you bookmark our Black Friday and Cyber Monday pages for later in the year!
Palestinian men take part in evening prayers inside Jerusalem’s Old City, next to the Lion’s Gate, July 24, 2017.
UNITED NATIONS (Reuters) – United Nations Middle East envoy Nickolay Mladenov warned on Monday that a solution was needed by Friday to the Jerusalem mosque crisis, which he said threatens to have “potential catastrophic costs well beyond the walls of the Old City.”
Israel installed metal detectors at entry points to Al-Aqsa mosque compound in Jerusalem after two police guards were shot dead on July 14, triggering the bloodiest clashes between Israelis and Palestinians in years.
Incensed at what they perceive as a violation of delicate decades-old access arrangements at Islam’s third-holiest site, many Palestinians have refused to go through the metal detectors, holding street prayers and often violent protests.
“It is extremely important that a solution to the current crisis be found by Friday,” Mladenov told reporters after briefing the U.N. Security Council behind closed doors. “The dangers on the ground will escalate if we go through another cycle of Friday prayer without a resolution.”
He also warned that the crisis was not a localized event.
“(It has) the potential to have catastrophic costs well beyond the walls of the Old City, well beyond Israel and Palestine, well beyond the Middle East itself,” Mladenov said.
Israeli police officers stand guard next to recently installed metal detectors at an entrance to the compound known to Muslims as Noble Sanctuary and to Jews as Temple Mount in Jerusalem’s Old City July 23, 2017.Ammar Awad
The 15-member Security Council met on the crisis at the request of Sweden, France and Egypt.
Sweden’s Deputy U.N. Ambassador Carl Skau posted on Twitter after the meeting that Security Council members “agree on need for de-escalation, condemnation of violence and urgent dialogue to calm tensions in Jerusalem.”
Non-Muslim visitors wait to enter the compound known to Muslims as Noble Sanctuary and to Jews as Temple Mount in Jerusalem’s Old City July 24, 2017.Ronen Zvulun
The Security Council is due to hold its quarterly Middle East briefing on Tuesday. Mladenov appealed to member states to “avoid further inflaming the situation” when they address the public meeting.
The violence began on Friday, when Israeli security forces shot three demonstrators dead, Palestinian medics said. Israeli police said they were investigating the charge.
On the same day, a Palestinian stabbed three Israelis in the occupied West Bank after vowing on Facebook to take up his knife and heed “Al-Aqsa’s call.”
“We will enable everybody to come and pray on the Temple Mount, but at the same time we will do whatever is necessary to maintain security of this important site,” Israeli U.N. Ambassador Danny Danon said ahead of the meeting.
Palestinian U.N. envoy Riyad Mansour told reporters: “We are against violence … and we want the Security Council to have the political will to protect the Palestinian people against such violence from the Israeli occupying authority.”
Additional reporting by Riham Alkousaa; Editing by Tom Brown and Lisa Shumaker
In some recent troubleshooting, I tried to get the Characters palette to appear by selecting the Input menu’s Emoji & Symbols item. This worked in every app except Safari: switching from, say, the Finder to Safari hid the palette. Choose Hide and Show from the Input menu didn’t fix it. Something was corrupted.
If you have this problem, follow these steps:
In the Finder, select Go > Go to Folder or press Command-Shift-G.
Now enter exactly the following: ~/Library/Preferences/
You’ll now be in the Preferences folder for the currently logged in user. Find the file named com.apple.HIToolbox.plist and move it to the Trash.
Select Input menu > Show Emoji & Symbols.
You should now be able to see the Characters palette floating over any app you’re using.
Ask Mac 911
We’ve compiled a list of the most commonly asked questions we get, and the answers to them: read our super FAQ to see if you’re covered. If not, we’re always looking for new problems to solve! Email yours [email protected] including screen captures as appropriate. Mac 911 cannot reply to email with troubleshooting advice nor can we publish answers to every question.
A friend wrote for advice, as she has believes she might face unwarranted harassment for some work of hers that’s going to be released. She wondered how she could best secure everything to do with her online identity before someone manages to wriggle inside her defenses.
Most people are reactive, waiting until a bad event to take action—whether total loss of data in a hard drive crash, or an account being hijacked. It’s great she was thinking about this ahead of time, and the advice I offered her is useful to everyone who finds themselves in that position, or just wants a security tune-up.
Mac and iOS users are often a bit smug about the security of their devices. (I know I can be.) But because of Apple’s architecture, there’s little to nothing you can do in iOS, and little to nothing that’s useful in OS X.
Primarily, these good habits will serve you well: Don’t open email you don’t recognize, and if you do, certainly don’t click any links or open any attachments. Don’t click links on dubious-looking websites. Don’t accept messages in iOS or OS X to install custom profiles when you haven’t sought them out. Being less credulous may waste some of your time, but avoid obvious problems.
The exploits that have affected Apple’s operating system in the last year were such that generally there was nothing you could do to avoid being taken advantage of. That sounds depressing, except that most of them also had obscure vectors, making them hard to implement in practice—and none were discovered “in the wild” or in forms that could spread rapidly.
What you can do in OS X, however, is install software that monitors what is talking to your computer and what service your computer is accessing. I’ve used an older version of what’s now NetBarrier X8 in the Internet Security X8 package from Intego, and Objective Development’s Little Snitch. While I don’t find any real value in anti-malware software, seeing what your system and software are up to can be reassuring.
This is also useful when you’re on networks you don’t know and trust, so you can see the kinds of behavior originating from the network around you—and potentially alert a café owner or a store manager if you see someone engaged in malicious activity.
Further to this point, using a virtual private network (VPN) whenever you’re outside your comfort zone—which can include some kinds of activities on your home network—effectively locks down your Internet traffic to anyone who can intercept data over a local Wi-Fi or ethernet network and at points between that and the other end of the VPN connection in a data center somewhere. I’ve tested and can recommend both Cloak and TunnelBear, which offer varying packages and combos for limited or unlimited data and multi-platform support with a single account.
None of this assures that people can’t break in, but it reduces points of weakness, and that’s always good.
Everywhere you can, enable two-factor authentication (2FA) or token-based logins. As I’ve written about many times, most cloud-based and social-networking services now offer some variant of it. I use Authy to manage my Time-based One-time Passwords (TOTPs), which Google, Slack, Amazon, and other outfits offer. Some will only or optionally let you use SMS. Apple’s 2FA, upgraded last fall, relies on sending information to iOS or OS X devices registered to the same Apple ID, and using SMS or voice as a fallback. (After months of trying to get my Apple ID to support 2FA, I was finally able to disable the older two-step verification and enable 2FA.)
A second factor prevents someone who obtains or guesses your password from using that from anywhere in the world to log into your account. If your services offers login alerts, which warn you whenever a new device is added or a login occurs, enable that too.
Check all social networking, email, financial, and other services you use beyond 2FA to examine privacy options. Some networks will let people who have some information about you find out more, or look you up by email address, even if there’s no public listing that associates you. They may be able to let a friend of a friend to obtain your phone number or physical address; you might consider wiping that data or further restricting it.
I also recommend changing your passwords comprehensively across all services you use. While it’s a pain, if you either can’t recall the last time you swapped a password, or you use the same password at multiple sites, the time is ripe. I recommend a password management and sync system (I use 1Password) both to create strong, unique passwords and to let you access to them whenever you need them on whatever platform you’re using. (1Password’s creators, AgileBits, have both family and business sharing options that can help you distribute passwords multiple people need; it’s great in families where spouses or parents/kids need to have access to the same password, too.)
Many hacks start with a weak link. That’s often a disused email address that you set or still use as a backup address at another service. To break into the more-important service, a cracker will poke at these weak links, break into an email address, then use a password reset or another option that allows them to use the email access as a knife to crack open the oyster of the service. So recheck all your backup/alternative email addresses associated with all your accounts as well.
Finally, while these aren’t per se computer related, I recommend you contact your cellular provider and your local home phone carrier (if you have one). You can typically put a lock or extra protection on phone accounts; they’re often a vector for attackers who use social engineering or online account management to try to shift your phone number, texts, or other services elsewhere, which can aid in identity fraud, accessing private information, or intercepting an SMS second factor.
Along these lines, you should also pull your credit reports at the three major credit bureaus, and consider putting a freeze on credit checks and issuance for every member of your immediate family. Opening cards in your name and other tricks to ruin credit is a common strategy for harassers. You should also look around for ratings of credit-monitoring services. I have free access to one after an online account breach, and it’s reliably informed me of all (so far legitimate) activity on my credit reports.
It’s no fun to worry about these sorts of things, but it’s also a reality of our modern day. If you’re concerned you might be targeted by a political, criminal, or social group, preparation will save heartbreak.