SSL certificates not created using the MD5 hash function, company says
January 8, 2009
PRESS RELEASE
Jersey City, NJ, January 8, 2009 - Comodo CA Limited, the second-largest issuer of high-assurance digital certificates, today announced that none of its certificates is created using the MD5 hash function.
The MD-5 certificate algorithm has been known to be subject to potential compromise since 1996. Recently, a team of security researchers exploited a flaw in the MD-5 hash function, demonstrating the potential to generate bogus certificates that would be trusted by major web browsers. Though there have been no documented attacks arising from this, SSL users are advised to check with their respective certification authorities to determine if their certificates were issued using MD-5, and if so, consider replacing them with more secure alternatives..
About Comodo
The Comodo companies provide the infrastructure that is essential in enabling e-merchants, other Internet-connected companies, software companies, and individual consumers to interact and conduct business via the Internet safely and securely. The Comodo companies offer PKI SSL, Code Signing, Content Verification and E-Mail Certificates; award winning PC security software; vulnerability scanning services for PCI Compliance; secure e-mail and fax services. Continual innovation, a core competence in PKI, and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet's ongoing development. Comodo secures and authenticates online transactions and communications for over 200,000 business customers and has over 10,000,000 installations of desktop security products. For additional information on Comodo - Creating Trust Online visit our website. For more information, reporters and analysts may contact: Katharine Hadow Comodo--Creating Trust Online
You May Also Like
The fuel in the new AI race: Data
April 23, 2024Securing Code in the Age of AI
April 24, 2024Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024