Go from iPhone to Spy Phone!

Spy Bot is the surveillance app that turns your iPad, iPhone and iPod Touch into an instant spy phone / bluetooth spy camera! Use your iPhone, iPad or iPod Touch’s camera to stream live video and audio to connected devices up to 50 feet away! Perfect for situations where you can’t be in the room, but need to know what’s going on.

Download Spy Bot
Available @ the App Store

Spy Bot, the only Bluetooth Surveillance App for iOS


Stream Video

Spy Bot links two i-devices together to create an instant surveillance camera setup. Set up in an inconspicuous spot and watch from up to 50 feet away.

Record Discreetly

You can discreetly control recording and streaming from up to 50 ft away. Recorded videos save to the streaming devices ‘My Videos’ tab.

Bluetooth

Using Bluetooth to connect the devices makes Spy Bot extremely versatile. Set up the surveillance app anywhere – no wifi or carrier signal needed.

Upload & Share

What fun is secretly recording video if no one sees it? Upload captured videos and compete for dope prizes! Be sure to keep it classy, though.

Protect Yourself

If your hidden camera is about to be discovered, use the “Kill” button to exit the program on both devices to the main screen, protecting your identity.


250x500-iPhone5

How does Spy Bot work?

Simply put, Spy Bot works as a surveillance app for your iPhone, iPad and / or iPod Touch. You use devices you already own to create an instant bluetooth spy camera. One device acts as the camera, and the other receives the video / audio.

For instance, you could connect your iPhone to your friend’s iPad. Then set your iPhone down in an inconspicuous spot such as a desktop or somewhere it can blend in with the surroundings. From the next room, you could watch everything the iPhone’s camera sees from your friend’s iPad screen and control recording.

If someone notices the iPhone, press the kill button to exit the app. If they pick it up to investigate, all they will see is the home screen. You quickly enter saying, “I thought I left that in here! Thanks for finding it.”

325x200-iPhone-Streamer250x200-iPhone-Receiver


“Your personal files are encrypted by CTB Locker”: decrypt and remove ransomware virus

“Your personal files are encrypted by CTB Locker”: decrypt and remove ransomware virus

Be updated on all known editions of CTB-Locker, a nasty crypto ransomware program encoding victims’ data and extorting Bitcoins in exchange for decryption. According to the threat actors’ ads posted on darknet forums back in 2014, CTB is an acronym for “Curve-Tor-Bitcoin”. This malicious file-encrypting entity is a real old stager on the cyber blackmail […]

Docm file virus: what is it and how to remove

Docm file virus: what is it and how to remove

It’s a good security measure to keep macros in Docm files disabled these days, because ransomwares like Locky and Zepto use them to compromise computers. There’s a sensible reason why the devs at Microsoft chose to keep macros in Office documents turned off by default. The exploitation of these VBA-based scripts is one of the […]

JSE file virus decryption and removal

JSE file virus decryption and removal

The issue with an unsanctioned change of file format to .jse isn’t trivial, because it most likely means that a ransomware program has entered the computer. The crypto malware alert du jour has to do with a bevy of user reports about the scrambling of data files on PCs that involves the JSE extension. Whereas […]

Zepto virus: .zepto file extension decryptor

Zepto virus: .zepto file extension decryptor

The tutorial covers a revamped edition of the nasty Locky ransom Trojan, which now appends .zepto extension to ciphered files and extorts 0.5 Bitcoin. There is hardly any fundamental difference between the previous versions of Locky and the one that surfaced lately. Still, the ransomware attacks Windows PCs through social engineering, encrypts data using a […]

Decrypt RZA4096 ransomware: “All of your files were protected by a strong encryption with RZA4096”

Decrypt RZA4096 ransomware: “All of your files were protected by a strong encryption with RZA4096”

This is a self-help walkthrough applicable for computer troubleshooting and decrypting personal data scrambled by RZA4096, or CryptXXX, ransomware. Linguistic literacy is definitely a weak link of the gang responsible for distributing one of today’s nastiest ransom Trojans called CryptXXX and its alias known as UltraCrypter. The number of spelling errors that these guys did […]

.crypt1 virus file ransomware decryptor and removal: cryptz update

.crypt1 virus file ransomware decryptor and removal: cryptz update

After the rebranding of CryptXXX ransomware into UltraCrypter, the extensions it adds to files have been changing every few days, the latest one being .crypt1 or .cryptz. Some crypto viruses are created and distributed by people obviously lacking tech skills, but the .crypt1 extension ransomware definitely doesn’t fall under that category. This is an edition […]

UltraCrypter ransomware: how to recover .cryp1 virus files

UltraCrypter ransomware: how to recover .cryp1 virus files

Rather than indicate the name of their ransomware directly, a cybercriminal gang mentions UltraCrypter as the file recovery tool they peddle to victims. Online extortionists have rebranded their rapidly propagating CryptXXX ransomware. The recent changes have to do with the look and feel of the Trojan’s user interaction components, as well as the denomination of […]

ZCryptor ransomware: decrypt .zcrypt files

ZCryptor ransomware: decrypt .zcrypt files

Get rid of ZCryptor ransomware, prevent it from spreading over to other Windows computers and recover .zcrypt files that it skews during the attack. A ransom Trojan that locks files using a strong cryptosystem, appends them with .zcrypt extension and drops recovery instructions in ‘How to decrypt files.html’ document, is categorized as a severe ransomware […]

Decrypt and remove CryptXXX ransomware

Decrypt and remove CryptXXX ransomware

Learn an effective workaround to mitigate the damage from CryptXXX ransomware attack and decrypt files without paying the ransom. The use of strong cryptography to make one’s files morph into inaccessible junk isn’t the only adverse effect of being hit by CryptXXX ransom Trojan. It reportedly also engages in data theft and may even put […]

.777 files ransomware decrypter and virus removal

.777 files ransomware decrypter and virus removal

The ransomware scourge doesn’t seem to be letting go of users around the globe, this time with a variant extorting money to decrypt .777 extension files. A group of threat actors in charge of extortion campaigns through file-encrypting malware sticks with a ‘lucky number’ 777. This cyber ring first got into the spotlight of security […]

Page 12 of 16« First...«1011121314»...Last »