Go from iPhone to Spy Phone!

Spy Bot is the surveillance app that turns your iPad, iPhone and iPod Touch into an instant spy phone / bluetooth spy camera! Use your iPhone, iPad or iPod Touch’s camera to stream live video and audio to connected devices up to 50 feet away! Perfect for situations where you can’t be in the room, but need to know what’s going on.

Download Spy Bot
Available @ the App Store

Spy Bot, the only Bluetooth Surveillance App for iOS


Stream Video

Spy Bot links two i-devices together to create an instant surveillance camera setup. Set up in an inconspicuous spot and watch from up to 50 feet away.

Record Discreetly

You can discreetly control recording and streaming from up to 50 ft away. Recorded videos save to the streaming devices ‘My Videos’ tab.

Bluetooth

Using Bluetooth to connect the devices makes Spy Bot extremely versatile. Set up the surveillance app anywhere – no wifi or carrier signal needed.

Upload & Share

What fun is secretly recording video if no one sees it? Upload captured videos and compete for dope prizes! Be sure to keep it classy, though.

Protect Yourself

If your hidden camera is about to be discovered, use the “Kill” button to exit the program on both devices to the main screen, protecting your identity.


250x500-iPhone5

How does Spy Bot work?

Simply put, Spy Bot works as a surveillance app for your iPhone, iPad and / or iPod Touch. You use devices you already own to create an instant bluetooth spy camera. One device acts as the camera, and the other receives the video / audio.

For instance, you could connect your iPhone to your friend’s iPad. Then set your iPhone down in an inconspicuous spot such as a desktop or somewhere it can blend in with the surroundings. From the next room, you could watch everything the iPhone’s camera sees from your friend’s iPad screen and control recording.

If someone notices the iPhone, press the kill button to exit the app. If they pick it up to investigate, all they will see is the home screen. You quickly enter saying, “I thought I left that in here! Thanks for finding it.”

325x200-iPhone-Streamer250x200-iPhone-Receiver


Petya ransomware removal and system recovery (upd. June 27)

Petya ransomware removal and system recovery (upd. June 27)

Learn how the Petya ransomware is different from other crypto threats, why it is considered a high-profile infection, and how to go about the attack. The ransomware called Petya illustrates the fact that crypto viruses are evolving over time. The perpetrators are no longer content with the tactic where victims’ personal data is held for […]

Sorebrect ransomware – fileless malware exploits PsExec utility

Sorebrect ransomware – fileless malware exploits PsExec utility

The Sorebrect ransomware is more sophisticated than the average crypto strain because it boasts stealthy fileless execution and easily evades AV suites. Considering all ransom Trojans the same except their names is a wrong perception. Whereas the extortion scheme proper tends to be common ground, the modus operandi is a variable. The ransomware dubbed Sorebrect […]

Remove MOLE02 ransomware virus and decrypt .mole02 files (upd. June 15)

Remove MOLE02 ransomware virus and decrypt .mole02 files (upd. June 15)

It appears that CryptoMix virus is back again. Its fresh variant is labeled as MOLE02 ransomware. This update changes files extensions to .MOLE02 for all encrypted files. The new version of MOLE virus also uses new ransom note and Tor website. Ransom note text: !!!IMPORTANT INFORMATION!!! All of your files are encrypted with RSA 2048 […]

Erebus ransomware infects Linux web servers in South Korea

Erebus ransomware infects Linux web servers in South Korea

Since the crypto ransomware called Erebus is professionally designed and currently cannot be cracked, it is shaping up to be another serious security problem. There is no computer completely immune to ransomware. What is more, these threats are getting increasingly sophisticated over time. Even if one exercises due caution with files that go with malicious […]

Decrypt .master ransomware files – BTCWare virus variant

Decrypt .master ransomware files – BTCWare virus variant

A new version of the BTCWare ransom Trojan is out that appends the .master extension to encrypted files and drops a ransom note named !#_RESTORE_FILES_#!.inf. The evolution of the BTCWare crypto hoax is underway. Its latest edition has introduced a few external tweaks, while on the inside it is still the same, quite professionally tailored […]

Remove unTabs virus in Chrome, Firefox, IE and Safari

Remove unTabs virus in Chrome, Firefox, IE and Safari

Learn how to get rid of unTabs, a potentially unwanted program that gets installed on its own, changes the default search engine and displays nagging ads. It’s amazing how a commendable idea can be implemented in a way that makes people want to opt out. The application called unTabs is a shining example of such […]

Taskeng.exe virus popups removal in Windows

Taskeng.exe virus popups removal in Windows

The issue with Taskeng.exe popup windows fully demonstrates the blurred gist of present-day malware, where the line between legit and malicious is very thin. There are two different facets of the Taskeng.exe. On the one hand, it is a genuine Windows process referred to as the Task Scheduler Engine. Residing in C:\Windows\System32 directory, this entity […]

How to decrypt .wlu files – new Jaff ransomware extension

How to decrypt .wlu files – new Jaff ransomware extension

A new variant of the Jaff ransomware is out that appends the .wlu extension to enciphered files, presents itself as Jaff Decryptor and uses new ransom notes. It took the makers of the Jaff file-encrypting virus less than two weeks to contrive and launch a fresh edition of their nasty program. The bad news is […]

XData ransomware

XData ransomware

New ransomware called XData is rapidly making the rounds, so take precautions to avoid it and learn how to decrypt .~xdata~ files if the attack has occurred. Security analysts are accustomed to recurrent ransomware outbreaks, but few crypto infections spread like wildfire. The aggressive strain dubbed XData, which surfaced on May 18, 2017, has managed […]

Wanna Cry ransomware attack: dissecting the campaign

Wanna Cry ransomware attack: dissecting the campaign

Get the lowdown on the recent Wanna Cry, or Wana Decrypt0r, ransomware wave that took data on tens of thousands of computers hostage in less than a week. One of the heftiest ransomware outbreaks to date took root on May 12, 2017. A strain called Wanna Cry started making the rounds in a stealthy fashion, […]

Page 1 of 1412345»10...Last »