Snynet Solution Logo
MON - SUN: 10 AM - 6 PM
+60 11 5624 8319

Blog

M1 MacBook Air deals offer brand new record price lows at Amazon

Image Description

Amazon has just dropped the price of its M1 MacBook deals down to a brand new record low, with both the 256GB and 512GB models available for their cheapest costs yet. At £869.97, the 256GB version is now £30 cheaper than its previous record with a total saving of £129. However, you can save a massive £200 on the 512GB model, now available for just £1,049.97 (was £1,249)

These Macbook deals have only just appeared, so they're likely to prove particularly popular this week. We wouldn't wait too long to take advantage, then, especially considering the 512GB version is seeing such a dramatic price drop. 

The M1 MacBook Air has been seeing price drops for a few months now, but these offers top the lot. You're getting a great price for a 13.3-inch ultrabook here, and the performance coming out of the new M1 chip is a force to be reckoned with as well. 

Not in the UK? Scroll down for more cheap MacBook deals in your region.

Today's best M1 MacBook Air deals

M1 MacBook Air (256GB): £999 £869.97 at Amazon
The M1 MacBook Air has just dropped to a brand new record price low at Amazon. That beats the previous discount by an extra £30, offering up a powerful M1 ultrabook with 8GB RAM and a 256GB SSD for a fantastic price this week.

MacBook Air M1 (512GB): £1,249 £1,049.97 at Amazon
With a £200 discount, this 512GB M1 MacBook Air is now at a brand new record price low. Previously we'd only seen this price drop as far as £1,099, which means you're getting a fantastic discount with this new offer.

More MacBook deals

We're rounding up all the latest MacBook Air deals and MacBook Pro prices, but if you aren't looking for the luxury Apple experience you'll also find plenty of cheap laptop deals available as well. Plus, we're looking forward to even more offers in the upcoming Amazon Prime Day deals as well.

Date

18 May 2021

Sources


Share


Other Blog

  • API monitoring: taking visibility to the next level

    Ian Waters at ThousandEyes discusses the importance of API monitoring for modern application owners.

    Read More
  • Millions of Android users at risk of attack after widespread security issue uncovered

    Almost all Android smartphones could be vulnerable to remote code execution as a result of vulnerabilities discovered in the audio decoders of Qualcomm and MediaTek chips.

    The discovery of these vulnerabilities was made by Check Point Research (CPR) and if left unpatched, an attacker could exploit them to remotely gain access to a device’s camera and microphone by using a malformed audio file. At the same time, an unprivileged Android app could leverage these vulnerabilities to escalate its privileges in order to spy on a user’s media data and listen in on their conversations.

    Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/£10.99.

    Since most Android devices are powered by either Qualcomm or MediaTek chips, the impact of these vulnerabilities is wide reaching but thankfully, CPR responsibly disclosed its findings to both chipmakers who have since issued fixes.

    Check Point security researcher Slava Makkaveev provided further insight on the firm’s findings regarding these high and critical severity vulnerabilities in a press release, saying:

    "We've discovered a set of vulnerabilities that could be used for remote execution and privilege escalation on two-thirds of the world's mobile devices. The vulnerabilities were easily exploitable. A threat actor could have sent a song (media file) and when played by a potential victim, it could have injected code in the privileged media service. The threat actor could have seen what the mobile phone user sees on their phone. In our proof of concept, we were able to steal the phone's camera stream. What is the most sensitive information on your phone? I think it's your media: audio and videos. An attacker could have stolen that through these vulnerabilities.”

    Vulnerable audio decoders

    The vulnerabilities themselves were found in Apple Lossless Audio Codec (ALAC) which is also known as Apple Lossless.

    First introduced back in 2004 for lossless data compression of digital music, at the end of 2011 Apple made ALAC open source and the format is now embedded in many non-Apple audio playback devices and programs including Android smartphones as well as Linux and Windows media players and converters.

    While Apple has updated the proprietary version of its decoder by fixing and patching security issues several times, the shared code in the open source version of ALAC has not been patched since 2011. CPR discovered that Qualcomm and MediaTek ported the vulnerable ALAC code into their own audio decoders which is why so many Android smartphones are now at risk.

    CPR responsibly disclosed its findings to both chipmakers last year and they in turn released patches to fix all of their vulnerable audio decoders back in December. To avoid falling victim to any potential attacks though, you should make sure that your Android device has been updated with all of the latest patches.

    Read More
  • Flash is being removed from Windows soon - but there's a catch

    Microsoft readies its next generation of browsers, with Flash set to depart.

    Read More
  • Google releases Chrome security update to patch this dangerous bug

    Google Chrome's internal security team discovered the exploit and swiftly issued a security patch.

    Read More

Find Out More About Us

Want to hire best people for your project? Look no further you came to the right place!

Contact Us