Go from iPhone to Spy Phone!

Spy Bot is the surveillance app that turns your iPad, iPhone and iPod Touch into an instant spy phone / bluetooth spy camera! Use your iPhone, iPad or iPod Touch’s camera to stream live video and audio to connected devices up to 50 feet away! Perfect for situations where you can’t be in the room, but need to know what’s going on.

Download Spy Bot
Available @ the App Store

Spy Bot, the only Bluetooth Surveillance App for iOS


Stream Video

Spy Bot links two i-devices together to create an instant surveillance camera setup. Set up in an inconspicuous spot and watch from up to 50 feet away.

Record Discreetly

You can discreetly control recording and streaming from up to 50 ft away. Recorded videos save to the streaming devices ‘My Videos’ tab.

Bluetooth

Using Bluetooth to connect the devices makes Spy Bot extremely versatile. Set up the surveillance app anywhere – no wifi or carrier signal needed.

Upload & Share

What fun is secretly recording video if no one sees it? Upload captured videos and compete for dope prizes! Be sure to keep it classy, though.

Protect Yourself

If your hidden camera is about to be discovered, use the “Kill” button to exit the program on both devices to the main screen, protecting your identity.


250x500-iPhone5

How does Spy Bot work?

Simply put, Spy Bot works as a surveillance app for your iPhone, iPad and / or iPod Touch. You use devices you already own to create an instant bluetooth spy camera. One device acts as the camera, and the other receives the video / audio.

For instance, you could connect your iPhone to your friend’s iPad. Then set your iPhone down in an inconspicuous spot such as a desktop or somewhere it can blend in with the surroundings. From the next room, you could watch everything the iPhone’s camera sees from your friend’s iPad screen and control recording.

If someone notices the iPhone, press the kill button to exit the app. If they pick it up to investigate, all they will see is the home screen. You quickly enter saying, “I thought I left that in here! Thanks for finding it.”

325x200-iPhone-Streamer250x200-iPhone-Receiver


SyncCrypt ransomware: decrypt .kk virus files

SyncCrypt ransomware: decrypt .kk virus files

The new SyncCrypt ransomware acts more evasively than others, appends the .kk extension to encrypted files and drops ransom notes named readme.html/txt. The authors of SyncCrypt, a new uncrackable ransom Trojan that blemishes encoded files with the .kk extension token, have managed to break quite a bit of new ground with the way their contrivance […]

Lukitus/Locky ransomware removal: how to decrypt .lukitus virus files

Lukitus/Locky ransomware removal: how to decrypt .lukitus virus files

The Locky ransomware gets another facelift as its new variant is released, this time appending one’s encrypted files with the .lukitus extension. The behavior of Locky, one of the most widespread ransomware strains to date, shows how dynamic the online extortion environment is. This lineage has produced new offspring less than one week after its […]

Mamba ransomware removal and files decryptor

Mamba ransomware removal and files decryptor

Learn how the Mamba ransomware differs from commonplace file-encrypting infections, how to avoid it and what to do if it has already infected a computer. The ransomware called Mamba, or HDDCryptor, isn’t new. Those who keep track of big cybersecurity incidents might recall the defiant incursion against the San Francisco Municipal Transportation Agency that took […]

Decrypt .diablo6 files – Diablo6 variant of Locky ransomware [upd. Aug 09]

Decrypt .diablo6 files – Diablo6 variant of Locky ransomware [upd. Aug 09]

Breaking news of the day is the emergence of a new Locky ransomware iteration that arrives with spam and appends the .diablo6 extension to encrypted files. Although the security community started feeling confident that the once dominating Locky ransomware vanished from the radar, it made a reappearance that’s shaping up to be the next big […]

Recover .726 files virus: GlobeImposter 2.0 ransomware removal

Recover .726 files virus: GlobeImposter 2.0 ransomware removal

GlobeImposter ransomware continues wreaking havoc with its super-frequent updates, the latest one introducing the .726 extension added to hostage files. The GlobeImposter ransomware strand is currently outperforming all the other lineages in the competition. Its makers are coining fresh variants every other day, thus flooding the malicious ecosystem with a bevy of concurrently circulating samples. […]

Gryphon ransomware: decrypt .gryphon files and remove virus

Gryphon ransomware: decrypt .gryphon files and remove virus

Learn how the new Gryphon ransomware gains a foothold on a computer, how it affects victim’s personal data, and how to try and restore hostage files for free. The ransomware ecosystem has been generally idle over the past several weeks, with nothing but crude, poorly coded samples popping up once in a while. The strain […]

MOLE03 ransomware: how to decrypt .MOLE03 files

MOLE03 ransomware: how to decrypt .MOLE03 files

Brand new variant of the CryptoMix ransomware is out that speckles encrypted files with the .MOLE03 extension and still encrypts them beyond regular recovery. Things are apparently going well for the architects of the CryptoMix ransomware campaign. They keep on coining new versions, one in two weeks on average. This continuous refreshing of the malicious […]

Remove and decrypt Cryakl ransomware virus

Remove and decrypt Cryakl ransomware virus

Being infected with the Cryakl ransomware is a serious predicament as most of its variants are uncrackable due to threat actors’ robust operations security. Some ransomware strands can boast sleek design of GUIs and full automation of the extortion chain. Others look crude and even primitive. Although it may seem that pests representing the latter […]

Fenrir ransomware: removal and decryption techniques

Fenrir ransomware: removal and decryption techniques

New ransom Trojan called Fenrir uses an unusual file tweaking method and proliferates via booby-trapped software downloads, clearly trying to be different. There aren’t many ransomware species out there that go their own route in terms of the attack tactics and data impact. The specimen referred to as Fenrir is one of the few that […]

CRBR Encryptor virus: remove and decrypt ransomware files

CRBR Encryptor virus: remove and decrypt ransomware files

The Cerber ransomware update history now includes an entry on CRBR Encryptor, the latest version that assumed new characteristics but isn’t a game changer. As opposed to ransomware strands that sprinkle new iterations once or several times a week, the Cerber family is way more static. Perhaps that’s because it boasts quality stuffing, including the […]

Page 1 of 1612345»10...Last »