I tried out the nice bfbtester tool (Brute Force Binary Tester) today, which performs checks of single and multiple argument command line overflows as well as environment variable overflows and thus helps in finding possibly insecure software (and fixing it, of course).
I'll probably post a slightly longer article eventually, listing some more tools for checking and auditing software (either black-box style using bfbtester or similar tools, or white-box style, i.e. tools which scan the source code of the software being tested, like rats, flawfinder, pscan etc.).
Probably one of the most important security-related tools, used on a daily basis by many people, has been updated. The new OpenSSH 4.0 has been released a few days ago.
Among the usual bugfixes are also some nifty new features. IMHO a very nice thing is the new (optional) hashing of host names and addresses added to known_hosts files. This improves your privacy, as the list of hosts you connected to in the past, is not easily visible in plain-text anymore.
Yes, 1984 seems a lot like a reality. Nowadays even your garbage cans spy on you.
I have just created a small checklist in my security section about how to secure an Apache webserver.
Note that this is work in progress and will be improved as my time permits. Any comments or suggestions are highly welcome, though.
As I understand it, his points are that SHA-1 should be replaced on the long run, but there's no reason to panic right now.