Quantcast
Last updated on April 24, 2014 at 21:24 EDT

Latest MD5 Stories

Microsoft Attempts To Douse Flame Malware
2012-06-15 12:44:49

John Neumann for redOrbit.com The malware, called Flame, a highly complex malicious tool that has actively targeted computers in the Middle East, was forced to self-terminate almost completely without a trace, and was in fact discovered only after UN´s telecoms arm reached out to security firms to get help with identifying a virus stealing data from many Middle Eastern computers last month. The Flame malware, which was recently discovered infecting computers in Iran and other...

2011-12-31 08:00:00

Making a New Year´s resolution to protect privacy in 2012 just got easier with three free software programs released by MerlinCryption. Highly useful and handy, MerlinFileView, MerlinShred, and MerlinMD5 inspire good security habits that every data protection toolbox should include. Austin, TX (PRWEB) December 31, 2011 Making a New Year´s resolution to protect privacy in 2012 just got easier with three free software programs released by MerlinCryption. Highly useful and handy,...

2009-11-09 06:00:00

MINNEAPOLIS, Nov. 9 /PRNewswire/ -- As criminals increasingly use computers to aid their nefarious activities, investigators need an ever wider variety of tools to obtain and analyze computer data in order to track, apprehend and convict wrongdoers. Voom Technologies, Inc., (www.voomtech.com) just released an improved version of its renowned HardCopy 3 (HC3) forensic hard-drive duplicator, and has made available this feature upgrade free of charge to its HC3 customers, worldwide....

2009-05-05 10:00:00

Recently the U.S. National Institute of Standards and Technology (NIST) has reiterated its position that 1024-bit RSA private keys are obsolete for trusted root encryption at the end of next year. But, thanks to DigiCert's industry-leading 2048-bit key standard, DigiCert customers' trusted roots are future-proofed and NIST-rated viable until 2030. LINDON, Utah, May 5 /PRNewswire/ -- A recent report from the U.S. National Institute of Standards and Technology (NIST)--Special Publication...

2009-03-20 07:24:00

Leading Security Experts to Unveil New Attacks Against EV-SSL During CanSecWest Presentation VANCOUVER, British Columbia, March 20 /PRNewswire/ -- Intrepidus Group, a leading provider of information security solutions, today announced that Intrepidus Group Senior Consultant, Mike Zusman, and independent security researcher, Alexander Sotirov will be presenting findings of their joint research on the security of Extended Validation (EV) certificates for SSL websites during the tenth annual...

2009-03-04 10:00:00

Transparently upgradeable hash assures authenticity for compliance AUSTIN, Texas, March 4 /PRNewswire/ -- Caringo Inc., the leading provider of clustered storage software for accessing, storing and distributing content, today announced that it has been awarded the US Patent for transparently upgrading a hash algorithm for assuring data integrity and authenticity. Caringo's CAStor software allows organizations to implement storage clusters for unstructured data or content objects providing...

2009-03-03 10:11:00

LINDON, Utah, March 3 /PRNewswire/ -- Internet security researchers announced recently that they were able to forge digital certificates signed using the MD5 hashing algorithm. They were able to exploit known flaws in the algorithm in order to create the fake certificates, which could then be used to launch nearly undetectable phishing attacks. Studies show that this security breach could affect approximately 14% of SSL certificates on the Internet. DigiCert is the leading Certificate...

2009-01-12 07:00:00

Entrust SSL certificates based on SHA-1 standard, not issued via automated process DALLAS, Jan. 12 /PRNewswire-FirstCall/ -- During the December 2008 Chaos Communication Congress in Berlin, Germany, researchers presented a demonstration on how to forge apparently-authentic digital credentials - notably SSL digital certificates - by taking advantage of a loophole in the use of the MD5 cryptographic hash function, an older 128-bit function that is still supported by today's Web browsers....

d2267f68b44e03709aff6bde0bd601b11
2008-12-30 10:05:00

Independent security researchers in California and researchers at the Centrum Wiskunde & Informatica (CWI) in the Netherlands, EPFL in Switzerland, and Eindhoven University of Technology (TU/e) in the Netherlands have found a weakness in the Internet digital certificate infrastructure that allows attackers to forge certificates that are fully trusted by all commonly used web browsers. As a result of this weakness it is possible to impersonate secure websites and email servers and to...

2008-09-09 12:00:15

Today, leading CAN-SPAM compliance solutions provider UnsubCentral announced that its vice president and general manager John Engler will deliver a Webinar presentation titled, "MD5 Hashed Suppression Lists: A Practical Guide to Use and Implementation," on Tuesday, September 23, at 2:00 p.m. EDT. MD5 hashed suppression lists are the most common method and highly recommended for organizations to share suppression data, as they ensure that personally identifiable information (PII) is not...