Go from iPhone to Spy Phone!

Spy Bot is the surveillance app that turns your iPad, iPhone and iPod Touch into an instant spy phone / bluetooth spy camera! Use your iPhone, iPad or iPod Touch’s camera to stream live video and audio to connected devices up to 50 feet away! Perfect for situations where you can’t be in the room, but need to know what’s going on.

Download Spy Bot
Available @ the App Store

Spy Bot, the only Bluetooth Surveillance App for iOS


Stream Video

Spy Bot links two i-devices together to create an instant surveillance camera setup. Set up in an inconspicuous spot and watch from up to 50 feet away.

Record Discreetly

You can discreetly control recording and streaming from up to 50 ft away. Recorded videos save to the streaming devices ‘My Videos’ tab.

Bluetooth

Using Bluetooth to connect the devices makes Spy Bot extremely versatile. Set up the surveillance app anywhere – no wifi or carrier signal needed.

Upload & Share

What fun is secretly recording video if no one sees it? Upload captured videos and compete for dope prizes! Be sure to keep it classy, though.

Protect Yourself

If your hidden camera is about to be discovered, use the “Kill” button to exit the program on both devices to the main screen, protecting your identity.


250x500-iPhone5

How does Spy Bot work?

Simply put, Spy Bot works as a surveillance app for your iPhone, iPad and / or iPod Touch. You use devices you already own to create an instant bluetooth spy camera. One device acts as the camera, and the other receives the video / audio.

For instance, you could connect your iPhone to your friend’s iPad. Then set your iPhone down in an inconspicuous spot such as a desktop or somewhere it can blend in with the surroundings. From the next room, you could watch everything the iPhone’s camera sees from your friend’s iPad screen and control recording.

If someone notices the iPhone, press the kill button to exit the app. If they pick it up to investigate, all they will see is the home screen. You quickly enter saying, “I thought I left that in here! Thanks for finding it.”

325x200-iPhone-Streamer250x200-iPhone-Receiver


Hidden Tear: Is open-source ransomware really a good idea?

Hidden Tear: Is open-source ransomware really a good idea?

Over the past couple of years, security experts have gotten accustomed to dealing with ransomware breeds that pursue solely malicious goals. These are intrinsically profit-oriented pieces of code that circulate covertly, encrypt their victims’ files and demand a fee to make the badly mutilated data accessible again. Utku Sen, a researcher and security enthusiast from […]

Remove newsearch123 virus from Chrome, Firefox and IE

Remove newsearch123 virus from Chrome, Firefox and IE

Newsearch123 browser extension gets fairly high privileges on a computer without the user’s actually granting them, which is a clear signal of viral activity. When confronted with enticing free software downloads on the Internet, PC users should always be on the lookout for a catch that may lurk underneath the setup wizard screens. This is […]

How to decrypt .locked files and remove Locked ransomware virus

How to decrypt .locked files and remove Locked ransomware virus

The entry contains comprehensive instructions on ways to handle the .locked file ransomware, including data restoration workarounds and virus removal proper. It’s hard to think of a worse predicament for computer users than a ransom trojan attack. The sucker punch inflicted by these threats pursues the goal of making the victims redeem their personal information […]

RSA-4096 ransomware virus removal and decrypter

RSA-4096 ransomware virus removal and decrypter

“All of your files were protected by a strong encryption with RSA-4096”. RSA-4096 denotes a standard of asymmetric encryption where both components of the public-private key pair are 4096 bits long. Such a high degree of entropy means that the objective of data decoding is hardly feasible unless the aforementioned private key is readily available. […]

Locky ransomware: decrypt files and remove virus (Aug. 2017 upd.)

Locky ransomware: decrypt files and remove virus (Aug. 2017 upd.)

The Locky ransomware is a malicious code breed that poses elevated risk due to sizeable stealth, large attack surface and sophisticated money extortion tactic. What is Locky ransomware? (August 2017) The extortion contrivance called the Locky ransomware demonstrates that cybercriminals are obviously in pursuit of new operational mechanisms. Said infection is out-of-the-ordinary because its spreading […]

Decrypt .mp3 TeslaCrypt files. _h_e_l_p_recover_instructions removal

Decrypt .mp3 TeslaCrypt files. _h_e_l_p_recover_instructions removal

Learn how to handle the ransomware incident where files on a computer are appended with .mp3 extension and cannot be opened due to strong encryption. Security examiners and the makers of the notorious TeslaCrypt 3.0 ransomware have been playing catch-up since its emergence. The first few iterations of this crypto Trojan have been cracked owing […]

Recover .micro files encrypted by Cryptolocker (Crypt0l0cker) ransomware

Recover .micro files encrypted by Cryptolocker (Crypt0l0cker) ransomware

This post covers the latest edition of Cryptolocker ransom trojan that encrypts files on a computer and adds .micro extension to all personal files. The malicious cryptoware industry features odd associations and interchangeability between ostensibly unrelated infection samples. Here’s an example of this trend: a new, third iteration of TeslaCrypt virus surfaced a few weeks […]

Decrypt and remove .micro file virus

Decrypt and remove .micro file virus

If the extensions of files stored on a computer have been appended with .micro value, it means a ransom virus is inside and it must be taken care of ASAP. Different attributes of data kept on a PC stay invariable unless the admin intentionally changes them or a malicious program stealthily makes the respective modifications. […]

Remove dnsapi.dll missing error virus

Remove dnsapi.dll missing error virus

The infection that makes dnsapi.dll service function improperly on a Windows computer can make a mess of the user’s web navigation and cause system errors. There’s a couple of aliases of the malicious code referred to as the ‘DLL modifier’. The one dubbed ‘dnsapi.dll patcher’ is by far the most widespread variant representing this malware […]

How to remove RegSvr32.exe virus error

How to remove RegSvr32.exe virus error

Find out why RegSvr32.exe may be flagged by antivirus tools as malicious, although it’s a regular Windows process, and fix the associated error problems. Object linking and embedding (OLE) controls on Windows platform are normally deployed by the RegSvr32 process. Specifically, it is used for registering and unregistering ActiveX controls or DLL (Dynamic Link Library) […]

Page 14 of 16« First...10«1213141516»