Level: Technical


Mobile applications store all possible data. There are different ways to store critical data. Developers often realize the importance of encryption of the critical data themselves. However, many times things go wrong despite security checks. In an anonymous practice example, we will crack an encrypted password to access a mobile bank. We will need to prepare our own code for this because, with classic hacking tools, this is not possible.


From the very beginning of his professional career, Grega Prešeren has been conducting security audits and penetration tests. Since 2010, he has managed and conducted over 100 security audits of networks, IT services, web, mobile and other applications, industrial systems, etc. In 2015 and 2016, he was a major member of the security team at S&T. Since 2017, he has been working as a cyber security manager at Iskratel and as an Ethical hacker at the co-founded company CARBONSEC d.o.o.

Comments are closed.