Go from iPhone to Spy Phone!

Spy Bot is the surveillance app that turns your iPad, iPhone and iPod Touch into an instant spy phone / bluetooth spy camera! Use your iPhone, iPad or iPod Touch’s camera to stream live video and audio to connected devices up to 50 feet away! Perfect for situations where you can’t be in the room, but need to know what’s going on.

Download Spy Bot
Available @ the App Store

Spy Bot, the only Bluetooth Surveillance App for iOS


Stream Video

Spy Bot links two i-devices together to create an instant surveillance camera setup. Set up in an inconspicuous spot and watch from up to 50 feet away.

Record Discreetly

You can discreetly control recording and streaming from up to 50 ft away. Recorded videos save to the streaming devices ‘My Videos’ tab.

Bluetooth

Using Bluetooth to connect the devices makes Spy Bot extremely versatile. Set up the surveillance app anywhere – no wifi or carrier signal needed.

Upload & Share

What fun is secretly recording video if no one sees it? Upload captured videos and compete for dope prizes! Be sure to keep it classy, though.

Protect Yourself

If your hidden camera is about to be discovered, use the “Kill” button to exit the program on both devices to the main screen, protecting your identity.


250x500-iPhone5

How does Spy Bot work?

Simply put, Spy Bot works as a surveillance app for your iPhone, iPad and / or iPod Touch. You use devices you already own to create an instant bluetooth spy camera. One device acts as the camera, and the other receives the video / audio.

For instance, you could connect your iPhone to your friend’s iPad. Then set your iPhone down in an inconspicuous spot such as a desktop or somewhere it can blend in with the surroundings. From the next room, you could watch everything the iPhone’s camera sees from your friend’s iPad screen and control recording.

If someone notices the iPhone, press the kill button to exit the app. If they pick it up to investigate, all they will see is the home screen. You quickly enter saying, “I thought I left that in here! Thanks for finding it.”

325x200-iPhone-Streamer250x200-iPhone-Receiver


Goldeneye ransomware: virus decryption and removal

Goldeneye ransomware: virus decryption and removal

Similarly to its prototype called Petya, the new Goldeneye ransomware overwrites the Master Boot Record on PCs and demands a ransom to unlock the system. The nefarious craft of the Petya disk-encrypting ransomware is continuing with a new, slightly modified incarnation. As of December 6, 2016, numerous computer users are reporting attacks by a crypto […]

Decrypt .osiris files and remove Locky-Osiris ransomware virus

Decrypt .osiris files and remove Locky-Osiris ransomware virus

A new version of the Locky ransomware is out, which encrypts files using RSA and AES ciphers, appends them with the .osiris extension and demands 0.5 BTC. The latest update of the Locky ransomware as of December 5, 2016 has brought about a couple of changes to the way this infection manifests itself. The most […]

How to decrypt .wallet file ransomware virus

How to decrypt .wallet file ransomware virus

Learn how to go about the predicament where files on a computer become encrypted and get the .wallet extension due to the Dharma ransomware attack. Unexpected news hit the headlines of security resources mid-November: the developers of the CrySiS ransomware released the master decryption keys for their perpetrating software. This seemed like a big win […]

Cerber Ransomware 5.0.1: _README_.hta virus decryption and removal

Cerber Ransomware 5.0.1: _README_.hta virus decryption and removal

A notorious data-encrypting threat is currently manifesting itself as Cerber Ransomware 5.0.1, the latest edition that creates the _README_.hta ransom note. The Cerber ransomware keeps mutating to persevere with its successful deployment campaigns and continue to be a moving target for the IT security community. The new variant looks quite similar to its precursors on […]

Baidu Skype virus: get rid of Baidu.com link spam in Skype

Baidu Skype virus: get rid of Baidu.com link spam in Skype

Learn how to stop the Skype fraud where a virus compromises one’s account and sends spoofed messages with Baidu.com links to all of the victim’s contacts. Skype is a remarkable medium for people to stay in touch through video calls and instant messaging. At the same time, just like any popular communication platform, it is […]

Decrypt .zzzzz files and remove Locky/ZZZZZ ransomware virus

Decrypt .zzzzz files and remove Locky/ZZZZZ ransomware virus

Stay on top of the Locky ransomware epidemic, learn what characteristics its new ZZZZZ variant has under the hood and try to restore encrypted .zzzzz files. The temporarily dominant Aesir version of the Locky ransomware has recently passed the baton to a new build called ZZZZZ. While sharing many traits with its antecedent, it stands […]

.aesir files decryptor – Aesir virus ransomware removal

.aesir files decryptor – Aesir virus ransomware removal

The Locky ransomware has got a slightly updated look and feel, the new variant appending the .aesir extension and creating -INSTRUCTION.html ransom notes. A fresh edition of the Locky file-encrypting ransomware lineage has been discovered. While sharing a lot of the characteristics with its predecessor known as Thor, the pest in question is undoubtedly a […]

Locky ransomware evolution

Locky ransomware evolution

There are ransomware samples out there whose devs cannot boast professional data encryption practices, which has allowed researchers to create workarounds for decrypting hostage files. Some examples include the Globe, DXXD, DMA Locker, and 7ev3n strains. On the other hand, there are ransom Trojans like Locky, which cripple victims’ files beyond recovery. In that case, […]

Page 1 of 1012345»10...Last »