Go from iPhone to Spy Phone!

Spy Bot is the surveillance app that turns your iPad, iPhone and iPod Touch into an instant spy phone / bluetooth spy camera! Use your iPhone, iPad or iPod Touch’s camera to stream live video and audio to connected devices up to 50 feet away! Perfect for situations where you can’t be in the room, but need to know what’s going on.

Download Spy Bot
Available @ the App Store

Spy Bot, the only Bluetooth Surveillance App for iOS


Stream Video

Spy Bot links two i-devices together to create an instant surveillance camera setup. Set up in an inconspicuous spot and watch from up to 50 feet away.

Record Discreetly

You can discreetly control recording and streaming from up to 50 ft away. Recorded videos save to the streaming devices ‘My Videos’ tab.

Bluetooth

Using Bluetooth to connect the devices makes Spy Bot extremely versatile. Set up the surveillance app anywhere – no wifi or carrier signal needed.

Upload & Share

What fun is secretly recording video if no one sees it? Upload captured videos and compete for dope prizes! Be sure to keep it classy, though.

Protect Yourself

If your hidden camera is about to be discovered, use the “Kill” button to exit the program on both devices to the main screen, protecting your identity.


250x500-iPhone5

How does Spy Bot work?

Simply put, Spy Bot works as a surveillance app for your iPhone, iPad and / or iPod Touch. You use devices you already own to create an instant bluetooth spy camera. One device acts as the camera, and the other receives the video / audio.

For instance, you could connect your iPhone to your friend’s iPad. Then set your iPhone down in an inconspicuous spot such as a desktop or somewhere it can blend in with the surroundings. From the next room, you could watch everything the iPhone’s camera sees from your friend’s iPad screen and control recording.

If someone notices the iPhone, press the kill button to exit the app. If they pick it up to investigate, all they will see is the home screen. You quickly enter saying, “I thought I left that in here! Thanks for finding it.”

325x200-iPhone-Streamer250x200-iPhone-Receiver


WildFire Locker virus: how to decrypt .wflx ransomware files

WildFire Locker virus: how to decrypt .wflx ransomware files

Although the most reliable way to restore .wflx files encrypted by WildFire Locker is to pay the ransom, a few forensic techniques may do the trick as well. The WildFire Locker crypto ransomware has gone through ups and downs since the inception of this campaign in mid-July, but a recent abrupt spike in its circulation […]

Decrypt .vvv virus extension files (TeslaCrypt 4.0 ransomware)

Decrypt .vvv virus extension files (TeslaCrypt 4.0 ransomware)

Files with the .vvv extension are a byproduct of TeslaCrypt ransomware activity, where the virus encrypts one’s personal data and holds it for ransom. It’s difficult to imagine a predicament worse than the aftermath of a crypto malware compromise. These cyber infections target a critical asset of organizations or end users – their data. They […]

LeChiffre ransomware virus: decrypt and remove

LeChiffre ransomware virus: decrypt and remove

Find out what’s nonstandard about the LeChiffre ransom Trojan, get efficient prevention advice and learn how to restore .LeChiffre extension files. The crypto infection dubbed LeChiffre isn’t the most sophisticated one, but it proved to be enduring enough to stick around for many months. Originally discovered in spring of 2015, this contagion has been modified […]

Decrypt .cerber2 extension files – Cerber2 ransomware virus

Decrypt .cerber2 extension files – Cerber2 ransomware virus

Get an accurate analysis of the .cerber2 extension ransomware, learn how it is different from the original Cerber threat, and be instructed on data recovery. The moment the Cerber ransomware was first detected last March, security researchers realized that it was above and beyond the commonplace modus operandi of these sorts of infections. Not only […]

Decrypt XTBL virus: how to restore .xtbl files

Decrypt XTBL virus: how to restore .xtbl files

This entry describes an offbeat crypto ransomware sample that encourages victims to reach its operators over email and appends .xtbl extension to files. The current state of the ransomware industry dictates certain unspoken guidelines for the threat actors. The most sophisticated specimens boast a high degree of automation, where victims follow some Tor link, find […]

“All of your files are encrypted” – Locky ransomware virus

“All of your files are encrypted” – Locky ransomware virus

Locky ransomware versions, including the newest Zepto incarnation, display ‘All of your files are encrypted‘ alert and extort money to undo adverse impact. Given the abundance of crypto viruses spreading over the Internet, there are probably very few computer users unaware of this menace. As new samples are appearing literally every other day, some stick […]

“Your personal files are encrypted by CTB Locker”: decrypt and remove ransomware virus

“Your personal files are encrypted by CTB Locker”: decrypt and remove ransomware virus

Be updated on all known editions of CTB-Locker, a nasty crypto ransomware program encoding victims’ data and extorting Bitcoins in exchange for decryption. According to the threat actors’ ads posted on darknet forums back in 2014, CTB is an acronym for “Curve-Tor-Bitcoin”. This malicious file-encrypting entity is a real old stager on the cyber blackmail […]

Docm file virus: what is it and how to remove

Docm file virus: what is it and how to remove

It’s a good security measure to keep macros in Docm files disabled these days, because ransomwares like Locky and Zepto use them to compromise computers. There’s a sensible reason why the devs at Microsoft chose to keep macros in Office documents turned off by default. The exploitation of these VBA-based scripts is one of the […]

Page 1 of 712345»...Last »