"The Origin platform allows malicious users to exploit local vulnerabilities or features by abusing the Origin URI handling mechanism," ReVuln researchers Donato Ferrante and Luigi Auriemma wrote in a paper accompanying last week's demonstration. "In other words, an attacker can craft a malicious Internet link to execute malicious code remotely on [a] victim's system, which has Origin installed.
"[B]ecause it is very unclear whether the Senate will come to agreement on cybersecurity legislation in the near future, I urge you to explore and employ every lever of executive power that you possess to protect this country from the cyber threat," Rockefeller wrote in a letter to Obama on Monday. "We must act to address our cyber vulnerabilities as soon as possible and many components of the Cybersecurity Act are amenable to implementation via executive order, normal regulatory processes, or other executive action under the authorities of the Homeland Security Act."
The bill in question failed to pass congressional vote earlier this year. So much for due process."
In every hierarchy the cream rises until it sours. -- Dr. Laurence J. Peter