In general, unless you're specifically tailoring input to produce collisions, collision risk of a (formerly, in case of md5 and by now also sha1) cryptographically secure hash function is not ...
A design flaw in the decades-old RADIUS authentication protocol allows attackers to take over network devices from a man-in-the-middle position by exploiting MD5 hash collisions. The “secure enough” ...
Microsoft has given customers six months to find MD5 installations and prepare for a February 2014 patch that will block the broken algorithm. The clock is running on Windows administrators to sweep ...