http://www.taka.go.th/lib/captcha/tak_ash.htm
http://www.taka.go.th/lib/captcha/tak_ash.htm defaced by Ashiyane Digital Security Team
Secunia Security Advisory 44262
Secunia Security Advisory - Apple has acknowledged two vulnerabilities in iTunes, which can be exploited by malicious people to compromise a user's system.
Secunia Security Advisory 44151
Secunia Security Advisory - Two vulnerabilities have been reported in Apple Safari, which can be exploited by malicious people to compromise a user's system.
Secunia Security Advisory 44154
Secunia Security Advisory - Some vulnerabilities has been reported in Apple iOS for iPhone 4 (CDMA), which can be exploited by malicious people to compromise a vulnerable device.
Secunia Security Advisory 44207
Secunia Security Advisory - Some vulnerabilities has been reported in Apple iOS, which can be exploited by malicious people to disclose system information and compromise a vulnerable device.
Secunia Security Advisory 43832
Secunia Security Advisory - A vulnerability has been reported in Apple iPhone iOS, which can be exploited by malicious people to compromise a vulnerable device.
Secunia Security Advisory 43814
Secunia Security Advisory - Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.
Secunia Security Advisory 43696
Secunia Security Advisory - Multiple vulnerabilities have been reported in Apple Safari, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting and spoofing attacks, and compromise a user's system.
Secunia Security Advisory 43698
Secunia Security Advisory - Multiple vulnerabilities have been reported in Apple iOS, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting and spoofing attacks, cause a DoS (Denial of Service), and compromise a vulnerable device.
Secunia Security Advisory 43697
Secunia Security Advisory - Apple has acknowledge a security issue and multiple vulnerabilities in Apple TV, which can be exploited by malicious people to disclose sensitive information, cause a Dos (Denial of Service), and potentially compromise a vulnerable system.