Cheerleaders wanted!
Our cheerleaders are also looking for talented young people. Contact us if you want to cheer on our boys!

The main goal is to gain ground!

Profile of our American football club

We are happy to have you as a visitor on our website. Here you will always find the latest news on games, training units and club matters. Of course you will also be briefed on our latest victories and the many successes our club has enjoyed over the course of its history.

We invite you to browse the site at your leisure. And don't forget: We are all about our favorite sport.

In the end, its always touchdown time!

Fostering up and coming talent drives us forward

It goes without saying that we are proud of the successes and games won by our first and second team. Of course we want to see such successes repeated again and again in the future. Consequently, we place a lot of emphasis on the promotion and fostering of young talent. Many promising young players have already been discovered in our youth teams and we have developed them further.

What makes it even better is that they have stayed true to our club.

In one case in point demonstrating the hack, the experts geolocated a target automobile, tracked it instantly, followed it, remotely killed the engine and forced the automobile to avoid, then unlocked the doors. The experts said it was “trivially convenient” to hijack a vulnerable vehicle. Worse, it was possible to identify some car models, producing targeted hijacks or high-end vehicles even less complicated. 

According to their findings, the researchers also found they may listen in on the in-car microphone, built-in within the Pandora alarm program to make calls to the crisis services or roadside assistance. Ken Munro, founder of Pen Test out Partners, told TechCrunch this is their “biggest” project. The researchers contacted both Pandora and Viper with a seven-working day disclosure period, given the severity of the vulnerabilities. Both companies responded quickly to fix the flaws. When reached, Viper’s Chris Pearson confirmed the vulnerability has been fixed. “If used for malicious uses, [the flaw] could enable customer’s accounts to come to be accessed without authorization.” 
Viper blamed a recently available system update by a good service agency for the bug and said the problem was “quickly rectified.” “Directed [which owns Viper] believes that no consumer data was exposed and that no accounts had been accessed without authorization through the short period this vulnerability existed,” explained Pearson, but presented no evidence to how the company found that conclusion. In an extended email, Pandora’s Antony Noto challenged many of the researcher’s results, summated: “The system’s encryption was not cracked, the remotes where not hacked, [and] the tags weren't cloned,” he said. “A software glitch allowed non permanent access to these devices for a brief period of time, which includes now been addressed.”

 The study follows work this past year by Vangelis Stykas on the Calamp, a telematics provider that serves as the foundation for Viper’s cellular app. Stykas, who soon after joined Pen Test Companions and in addition worked on the automobile alarm task, found the iphone app was applying credentials hardcoded in the iphone app to log in to a central database, which provided anyone who logged in remote control of a connected vehicle.