Go from iPhone to Spy Phone!

Spy Bot is the surveillance app that turns your iPad, iPhone and iPod Touch into an instant spy phone / bluetooth spy camera! Use your iPhone, iPad or iPod Touch’s camera to stream live video and audio to connected devices up to 50 feet away! Perfect for situations where you can’t be in the room, but need to know what’s going on.

Download Spy Bot
Available @ the App Store

Spy Bot, the only Bluetooth Surveillance App for iOS


Stream Video

Spy Bot links two i-devices together to create an instant surveillance camera setup. Set up in an inconspicuous spot and watch from up to 50 feet away.

Record Discreetly

You can discreetly control recording and streaming from up to 50 ft away. Recorded videos save to the streaming devices ‘My Videos’ tab.

Bluetooth

Using Bluetooth to connect the devices makes Spy Bot extremely versatile. Set up the surveillance app anywhere – no wifi or carrier signal needed.

Upload & Share

What fun is secretly recording video if no one sees it? Upload captured videos and compete for dope prizes! Be sure to keep it classy, though.

Protect Yourself

If your hidden camera is about to be discovered, use the “Kill” button to exit the program on both devices to the main screen, protecting your identity.


250x500-iPhone5

How does Spy Bot work?

Simply put, Spy Bot works as a surveillance app for your iPhone, iPad and / or iPod Touch. You use devices you already own to create an instant bluetooth spy camera. One device acts as the camera, and the other receives the video / audio.

For instance, you could connect your iPhone to your friend’s iPad. Then set your iPhone down in an inconspicuous spot such as a desktop or somewhere it can blend in with the surroundings. From the next room, you could watch everything the iPhone’s camera sees from your friend’s iPad screen and control recording.

If someone notices the iPhone, press the kill button to exit the app. If they pick it up to investigate, all they will see is the home screen. You quickly enter saying, “I thought I left that in here! Thanks for finding it.”

325x200-iPhone-Streamer250x200-iPhone-Receiver


Fenrir ransomware: removal and decryption techniques

Fenrir ransomware: removal and decryption techniques

New ransom Trojan called Fenrir uses an unusual file tweaking method and proliferates via booby-trapped software downloads, clearly trying to be different. There aren’t many ransomware species out there that go their own route in terms of the attack tactics and data impact. The specimen referred to as Fenrir is one of the few that […]

CRBR Encryptor virus: remove and decrypt ransomware files

CRBR Encryptor virus: remove and decrypt ransomware files

The Cerber ransomware update history now includes an entry on CRBR Encryptor, the latest version that assumed new characteristics but isn’t a game changer. As opposed to ransomware strands that sprinkle new iterations once or several times a week, the Cerber family is way more static. Perhaps that’s because it boasts quality stuffing, including the […]

MOLE01 ransomware virus – how to decrypt .MOLE01 files

MOLE01 ransomware virus – how to decrypt .MOLE01 files

New CryptoMix ransomware variant has been discovered that subjoins the .MOLE01 extension to encrypted files and still drops _HELP_INSTRUCTION.txt ransom notes. The cyber perpetrators in charge of the CryptoMix / Revenge ransomware family appear to have a really weird take on math. The latest iteration of their code launched around July 7 has switched to […]

Decrypt and remove .aleta file extension ransomware (upd. July 16)

Decrypt and remove .aleta file extension ransomware (upd. July 16)

Learn how the .aleta file variant of the BTCWare strain manifests itself and try to restore encrypted files without submitting cryptocurrency to the attacker. The BTCWare crypto ransomware strand keeps on expanding. Although, to their credit, security analysts have been able to devise crack tools for several previous iterations of this family, each new sample […]

Mole00 ransomware: how to decrypt virus .MOLE00 files

Mole00 ransomware: how to decrypt virus .MOLE00 files

Learn how to remove MOLE00 ransomware strain from Windows computer and restore encrypted .MOLE00 extension files without submitting the ransom to attackers. July 2017 update: The most recent version of MOLE ransomware is .MOLE01 The Mole ransomware family engages much more social engineering in the attack chain than the vast majority of crypto threats in […]

Decrypt .loptr files – Locky ransomware virus variant

Decrypt .loptr files – Locky ransomware virus variant

This post provides analysis of the Locky ransomware edition that appends the .loptr extension to encrypted files and leaves loptr-[4_chars].htm ransom note. Some strains of ransomware surface and quickly vanish to never come back, but some evolve in order not to become stationary targets. The latter trend mainly applies to lineages of crypto malware architected […]

Perfc.dat file makes Windows immune to Petya/NotPetya ransomware

Perfc.dat file makes Windows immune to Petya/NotPetya ransomware

Researchers have found a way to protect a Windows computer against the current outbreak of the revamped Petya ransomware using the ‘perfc‘ file trigger. A new massive ransomware distribution wave, which took root as of June 28, is instilling fear with its top-notch proliferation tactics and devastating effect on compromised computers. This time, it’s a […]

Petya ransomware removal and system recovery (upd. June 29)

Petya ransomware removal and system recovery (upd. June 29)

Learn how the Petya ransomware is different from other crypto threats, why it is considered a high-profile infection, and how to go about the attack. The ransomware called Petya illustrates the fact that crypto viruses are evolving over time. The perpetrators are no longer content with the tactic where victims’ personal data is held for […]

Sorebrect ransomware – fileless malware exploits PsExec utility

Sorebrect ransomware – fileless malware exploits PsExec utility

The Sorebrect ransomware is more sophisticated than the average crypto strain because it boasts stealthy fileless execution and easily evades AV suites. Considering all ransom Trojans the same except their names is a wrong perception. Whereas the extortion scheme proper tends to be common ground, the modus operandi is a variable. The ransomware dubbed Sorebrect […]

Remove MOLE02 ransomware virus and decrypt .mole02 files (upd. July 03)

Remove MOLE02 ransomware virus and decrypt .mole02 files (upd. July 03)

It appears that CryptoMix virus is back again. Its fresh variant is labeled as MOLE02 ransomware. This update changes files extensions to .MOLE02 for all encrypted files. The new version of MOLE virus also uses new ransom note and Tor website. Ransom note text: !!!IMPORTANT INFORMATION!!! All of your files are encrypted with RSA 2048 […]

Page 1 of 1512345»10...Last »