MD5 Flaw Question

The MD-5 certificate algorithm has been known to be subject to potential compromise since 1996. Recently, a team of security researchers exploited a flaw in the MD-5 hash function, demonstrating the potential to generate bogus certificates that would be trusted by major web browsers. Though there have been no documented attacks arising from this, SSL users are advised to check with their respective certification authorities to determine if their certificates were issued using MD-5, and if so, consider replacing them with more secure alternatives..

If the MD-5 had a potential compromise since mid 1990’s why did multimillion dollar companies use it knowing this would of happened?

(Excluding Comodo Of Course)

Jacob

Maby they are to lazy to change their cryptation.
or maby MD5 is a bit more easy on the bandwidth.

or maby they thought that users don’t care.
or maby the md5 way require less processing power.
hehe I certainly dont know.
But those are my first guesses.