<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[A recent study found that 60% of MD5 password hashes can be cracked in under an hour using a single GPU, with 48% cracked in under a minute, highlighting the vulnerability of passwords protected only by fast hashing algorithms.]]></title><description><![CDATA[<p>A recent study found that 60% of MD5 password hashes can be cracked in under an hour using a single GPU, with 48% cracked in under a minute, highlighting the vulnerability of passwords protected only by fast hashing algorithms. Experts emphasize that passwords should be part of a broader identity-based security strategy, including multi-factor authentication and zero trust models, rather than relied upon as the sole security measure.<br /><a href="https://www.theregister.com/security/2026/05/07/60-of-md5-password-hashes-are-crackable-in-under-an-hour/5234954" rel="nofollow noopener"><span>https://www.</span><span>theregister.com/security/2026/</span><span>05/07/60-of-md5-password-hashes-are-crackable-in-under-an-hour/5234954</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/74e27ba1-c79d-4338-9275-201dee1271c9/a-recent-study-found-that-60-of-md5-password-hashes-can-be-cracked-in-under-an-hour-using-a-single-gpu-with-48-cracked-in-under-a-minute-highlighting-the-vulnerability-of-passwords-protected-only-by-fast-hashing-algorithms.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 02:45:09 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/74e27ba1-c79d-4338-9275-201dee1271c9.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 08 May 2026 16:36:12 GMT</pubDate><ttl>60</ttl></channel></rss>