Go from iPhone to Spy Phone!

Spy Bot is the surveillance app that turns your iPad, iPhone and iPod Touch into an instant spy phone / bluetooth spy camera! Use your iPhone, iPad or iPod Touch’s camera to stream live video and audio to connected devices up to 50 feet away! Perfect for situations where you can’t be in the room, but need to know what’s going on.

Download Spy Bot
Available @ the App Store

Spy Bot, the only Bluetooth Surveillance App for iOS


Stream Video

Spy Bot links two i-devices together to create an instant surveillance camera setup. Set up in an inconspicuous spot and watch from up to 50 feet away.

Record Discreetly

You can discreetly control recording and streaming from up to 50 ft away. Recorded videos save to the streaming devices ‘My Videos’ tab.

Bluetooth

Using Bluetooth to connect the devices makes Spy Bot extremely versatile. Set up the surveillance app anywhere – no wifi or carrier signal needed.

Upload & Share

What fun is secretly recording video if no one sees it? Upload captured videos and compete for dope prizes! Be sure to keep it classy, though.

Protect Yourself

If your hidden camera is about to be discovered, use the “Kill” button to exit the program on both devices to the main screen, protecting your identity.


250x500-iPhone5

How does Spy Bot work?

Simply put, Spy Bot works as a surveillance app for your iPhone, iPad and / or iPod Touch. You use devices you already own to create an instant bluetooth spy camera. One device acts as the camera, and the other receives the video / audio.

For instance, you could connect your iPhone to your friend’s iPad. Then set your iPhone down in an inconspicuous spot such as a desktop or somewhere it can blend in with the surroundings. From the next room, you could watch everything the iPhone’s camera sees from your friend’s iPad screen and control recording.

If someone notices the iPhone, press the kill button to exit the app. If they pick it up to investigate, all they will see is the home screen. You quickly enter saying, “I thought I left that in here! Thanks for finding it.”

325x200-iPhone-Streamer250x200-iPhone-Receiver


How to decrypt .ykcol virus files – Ykcol/Locky ransomware

How to decrypt .ykcol virus files – Ykcol/Locky ransomware

A fresh update of the Locky ransomware has brought about several changes, including the .ykcol extension being affixed to files, and ykcol.htm/ykcol.bmp rescue notes. Locky, one of the heavyweights on the online extortion arena, has undergone another major tweak. Its latest edition is referred to as Ykcol based on the new file extension token and […]

SynAck ransomware removal and files decryption

SynAck ransomware removal and files decryption

As the new SynAck ransomware campaign is taking root and starting to gain momentum, get a complete profile of this infection and learn how avoid it. Most ransomware strains in rotation represent known species, so this sector of e-blackmail industry is generally all about codebases and their spinoffs that keep being released. The recently discovered […]

How to remove tasksche.exe ransomware virus

How to remove tasksche.exe ransomware virus

The process named tasksche.exe may be an indicator of compromise in the WannaCry ransomware attack scenario, so it should be removed immediately if spotted. WannaCry, or Wana Decrypt0r 2.0, took the world by storm in May 2017. The outbreak, the aftermath of which is still around at the time of this writing, is considered to […]

GlobeImposter 2.0 ransomware: decrypt .725/.726 files virus (Sep. 2017)

GlobeImposter 2.0 ransomware: decrypt .725/.726 files virus (Sep. 2017)

Learn how to tackle the GlobeImposter 2.0 ransomware attack and try to recover encrypted files without paying a Bitcoin ransom to the perpetrators. The crypto malware environment has grown complex enough to produce spinoffs and even imposters that mimic the look and feel of certain popular virus strands. The sample referred to as GlobeImposter 2.0 […]

Defray ransomware removal and data decryption

Defray ransomware removal and data decryption

Get an in-depth security report on the new Defray ransomware that zeroes in on high-profile targets, encrypts proprietary data and holds it for ransom. Targeted cyber-attacks with crypto ransomware is currently the exception rather than the rule. Large-scale extortion campaigns indiscriminate about victim types apparently pay off better and are therefore a much more common […]

Arena virus: how to recover .arena extension files (Sep. 2017)

Arena virus: how to recover .arena extension files (Sep. 2017)

New persona of the Crysis ransomware has been released that appends the .arena extension to encrypted data and still implements encryption securely. The crypto ransomware breed known as Crysis, or Dharma, appears to be gearing up for a rise. It has been spawning malicious descendants almost on a weekly basis since early August 2017, having […]

EMPTY ransomware: decrypt .EMPTY virus files

EMPTY ransomware: decrypt .EMPTY virus files

The CryptoMix ransomware strand keeps spewing out new variants, the latest one acting very much like predecessors but appending the .EMPTY extension to files. It’s hard to think of a crypto malware strand that stays the same over time and doesn’t spawn spinoffs that inherit basic hallmarks of the original infection while adding some novelty […]

Cesar ransomware virus: how to decrypt .cesar files

Cesar ransomware virus: how to decrypt .cesar files

This article provides comprehensive details of the new Crysis / Dharma ransomware variant that appends the .cesar or .cezar extension to encrypted files. The Crysis ransomware, previously known as Dharma, has suddenly awoken after several months of inactivity. Moreover, the halt was accompanied by an anonymous dump of master decryption keys in late May 2017. […]

SyncCrypt ransomware: decrypt .kk virus files

SyncCrypt ransomware: decrypt .kk virus files

The new SyncCrypt ransomware acts more evasively than others, appends the .kk extension to encrypted files and drops ransom notes named readme.html/txt. The authors of SyncCrypt, a new uncrackable ransom Trojan that blemishes encoded files with the .kk extension token, have managed to break quite a bit of new ground with the way their contrivance […]

Lukitus/Locky ransomware removal: how to decrypt .lukitus virus files

Lukitus/Locky ransomware removal: how to decrypt .lukitus virus files

The Locky ransomware gets another facelift as its new variant is released, this time appending one’s encrypted files with the .lukitus extension. The behavior of Locky, one of the most widespread ransomware strains to date, shows how dynamic the online extortion environment is. This lineage has produced new offspring less than one week after its […]

Page 1 of 1712345»10...Last »