Go from iPhone to Spy Phone!

Spy Bot is the surveillance app that turns your iPad, iPhone and iPod Touch into an instant spy phone / bluetooth spy camera! Use your iPhone, iPad or iPod Touch’s camera to stream live video and audio to connected devices up to 50 feet away! Perfect for situations where you can’t be in the room, but need to know what’s going on.

Download Spy Bot
Available @ the App Store

Spy Bot, the only Bluetooth Surveillance App for iOS


Stream Video

Spy Bot links two i-devices together to create an instant surveillance camera setup. Set up in an inconspicuous spot and watch from up to 50 feet away.

Record Discreetly

You can discreetly control recording and streaming from up to 50 ft away. Recorded videos save to the streaming devices ‘My Videos’ tab.

Bluetooth

Using Bluetooth to connect the devices makes Spy Bot extremely versatile. Set up the surveillance app anywhere – no wifi or carrier signal needed.

Upload & Share

What fun is secretly recording video if no one sees it? Upload captured videos and compete for dope prizes! Be sure to keep it classy, though.

Protect Yourself

If your hidden camera is about to be discovered, use the “Kill” button to exit the program on both devices to the main screen, protecting your identity.


250x500-iPhone5

How does Spy Bot work?

Simply put, Spy Bot works as a surveillance app for your iPhone, iPad and / or iPod Touch. You use devices you already own to create an instant bluetooth spy camera. One device acts as the camera, and the other receives the video / audio.

For instance, you could connect your iPhone to your friend’s iPad. Then set your iPhone down in an inconspicuous spot such as a desktop or somewhere it can blend in with the surroundings. From the next room, you could watch everything the iPhone’s camera sees from your friend’s iPad screen and control recording.

If someone notices the iPhone, press the kill button to exit the app. If they pick it up to investigate, all they will see is the home screen. You quickly enter saying, “I thought I left that in here! Thanks for finding it.”

325x200-iPhone-Streamer250x200-iPhone-Receiver


DXXD ransomware: how to decrypt .dxxd files virus

DXXD ransomware: how to decrypt .dxxd files virus

The ransomware to be dissected in this post encrypts its victims’ files using AES-256 algorithm and appends the dxxd string to the original file extensions. What is DXXD ransomware The DXXD crypto ransomware malady is notoriously intricate. Aside from the customary tactics leveraged by most online extortionists, the individuals running said campaign use more social […]

Decrypt .dot file virus: how to recover from .dot extension ransomware (upd. 2017)

Decrypt .dot file virus: how to recover from .dot extension ransomware (upd. 2017)

The post is based on a comprehensive research of the .dot file extension virus and provides viable methods to restore .dot entries encrypted by the ransomware. There are several unique properties that enable end users and researchers to identify a piece of ransomware they are confronted with. The ones that lay on the surface include […]

Cerber Decryptor: how to remove Readme.hta ransomware

Cerber Decryptor: how to remove Readme.hta ransomware

This tutorial covers all the changes that the Cerber ransomware underwent as a result of the latest update and provides applicable recovery methods. It looks like the Cerber ransomware has switched from using the .cerber3 extension to a random one. This is one of the several modifications made to this infection in the course of […]

Odin virus removal: how to decrypt .odin extension files

Odin virus removal: how to decrypt .odin extension files

The guide below provides a comprehensive analysis of the .odin ransomware virus and lists viable methods to restore files encrypted by this new Locky version. There is a new variant of the notoriously prolific ransomware called Locky in the wild. The latest spinoff appends the .odin extension to encrypted files instead of the previously used […]

JohnyCryptor ransomware: decrypt .johnycryptor@hackermail.com.xtbl virus files

JohnyCryptor ransomware: decrypt .johnycryptor@hackermail.com.xtbl virus files

Learn how to act in case of the JohnyCryptor ransomware attack and get around the cipher to restore .johnycryptor@hackermail.com.xtbl (.johnycryptor@aol.com.xtbl) files. The ransomware family known as Troldesh, or Shade, is amongst the most prolific ones to date in terms of the different spinoffs circulating on the open Internet. The sample that appends a victim’s files […]

Remove startgo123 virus – startgo123.com search index removal

Remove startgo123 virus – startgo123.com search index removal

Startgo123 is a potentially unwanted app that causes browsing issues, so it should be removed from an infected PC by means of a specially crafted procedure. Online criminals’ disrespectful attitude toward end users’ Internet preferences is clearly objectified through browser hijackers like startgo123. The adverse effect from this offending applet is twofold. It replaces DNS […]

Decrypt .cry files virus and remove CryLocker ransomware

Decrypt .cry files virus and remove CryLocker ransomware

The CryLocker ransomware, which appends .cry extension to encrypted files, impersonates an inexistent government organization and demands $625 for recovery. The scourge of crypto malware is one of the few computer plagues that AV labs and the community of security experts have virtually no viable response for, although these infections have been around for years. […]

Decrypt and remove CrypMIC/CryptMIC ransomware

Decrypt and remove CrypMIC/CryptMIC ransomware

Find out how to get around the data encryption by CrypMIC / CryptMIC ransomware, learn what other infection it resembles and get the attack workflow details. When the CrypMIC ransomware campaign broke out in late July 2016, it instantly drew the attention of security experts. Also dubbed CryptMIC, this computer threat bears a resemblance to […]

Zeus virus alert removal: remove “Windows detected ZEUS virus” popup

Zeus virus alert removal: remove “Windows detected ZEUS virus” popup

Be updated on the latest social engineering fraud affecting web browsers and get rid of rogue popups claiming that Windows detected Zeus virus. Tech support scams are steadily becoming the computer security issue du jour. The threat actors in charge of these stratagems leverage malicious software to reroute the targeted users’ Internet traffic, and then […]

Decrypt .encrypted file virus and remove Cryptolocker ransomware

Decrypt .encrypted file virus and remove Cryptolocker ransomware

Learn what computer infection makes victims’ files inaccessible, appends the .encrypted extension and creates Decrypt_Instructions ransom notes. Nothing compares to ransomware when it comes to the damage made to compromised systems. This sub-cluster of malicious code exploits computers in the following way: it enciphers every piece of personal data stored on them and tells victims […]

Page 10 of 16« First...«89101112»...Last »