Latest MD5 Stories

Microsoft Attempts To Douse Flame Malware
2012-06-15 12:44:49

Microsoft Wednesday released an automatic updater--available for Windows Vista, Windows 7, as well as Windows Server 2008 and 2008 R2--that keeps tabs on a list of known-bad digital certificates, including the one exploited by Flame.

2011-12-31 08:00:00

Making a New Year’s resolution to protect privacy in 2012 just got easier with three free software programs released by MerlinCryption.

2009-11-09 06:00:00

MINNEAPOLIS, Nov. 9 /PRNewswire/ -- As criminals increasingly use computers to aid their nefarious activities, investigators need an ever wider variety of tools to obtain and analyze computer data in order to track, apprehend and convict wrongdoers.

2009-05-05 10:00:00

Recently the U.S. National Institute of Standards and Technology (NIST) has reiterated its position that 1024-bit RSA private keys are obsolete for trusted root encryption at the end of next year.

2009-03-20 07:24:00

Leading Security Experts to Unveil New Attacks Against EV-SSL During CanSecWest Presentation VANCOUVER, British Columbia, March 20 /PRNewswire/ -- Intrepidus Group, a leading provider of information security solutions, today announced that Intrepidus Group Senior Consultant, Mike Zusman, and independent security researcher, Alexander Sotirov will be presenting findings of their joint research on the security of Extended Validation (EV) certificates for SSL websites during the tenth annual...

2009-03-04 10:00:00

Transparently upgradeable hash assures authenticity for compliance AUSTIN, Texas, March 4 /PRNewswire/ -- Caringo Inc., the leading provider of clustered storage software for accessing, storing and distributing content, today announced that it has been awarded the US Patent for transparently upgrading a hash algorithm for assuring data integrity and authenticity.

2009-03-03 10:11:00

LINDON, Utah, March 3 /PRNewswire/ -- Internet security researchers announced recently that they were able to forge digital certificates signed using the MD5 hashing algorithm.

2009-01-12 07:00:00

Entrust SSL certificates based on SHA-1 standard, not issued via automated process DALLAS, Jan.

2008-12-30 10:05:00

Independent security researchers in California and researchers at the Centrum Wiskunde & Informatica (CWI) in the Netherlands, EPFL in Switzerland, and Eindhoven University of Technology (TU/e) in the Netherlands have found a weakness in the Internet digital certificate infrastructure that allows attackers to forge certificates that are fully trusted by all commonly used web browsers.

2008-09-09 12:00:15

Today, leading CAN-SPAM compliance solutions provider UnsubCentral announced that its vice president and general manager John Engler will deliver a Webinar presentation titled, "MD5 Hashed Suppression Lists: A Practical Guide to Use and Implementation," on Tuesday, September 23, at 2:00 p.m. EDT.

Word of the Day
  • Withering but not falling off, as a blossom that persists on a twig after flowering.
The word 'marcescent' comes from a Latin word meaning 'to wither'.