Go from iPhone to Spy Phone!

Spy Bot is the surveillance app that turns your iPad, iPhone and iPod Touch into an instant spy phone / bluetooth spy camera! Use your iPhone, iPad or iPod Touch’s camera to stream live video and audio to connected devices up to 50 feet away! Perfect for situations where you can’t be in the room, but need to know what’s going on.

Download Spy Bot
Available @ the App Store

Spy Bot, the only Bluetooth Surveillance App for iOS


Stream Video

Spy Bot links two i-devices together to create an instant surveillance camera setup. Set up in an inconspicuous spot and watch from up to 50 feet away.

Record Discreetly

You can discreetly control recording and streaming from up to 50 ft away. Recorded videos save to the streaming devices ‘My Videos’ tab.

Bluetooth

Using Bluetooth to connect the devices makes Spy Bot extremely versatile. Set up the surveillance app anywhere – no wifi or carrier signal needed.

Upload & Share

What fun is secretly recording video if no one sees it? Upload captured videos and compete for dope prizes! Be sure to keep it classy, though.

Protect Yourself

If your hidden camera is about to be discovered, use the “Kill” button to exit the program on both devices to the main screen, protecting your identity.


250x500-iPhone5

How does Spy Bot work?

Simply put, Spy Bot works as a surveillance app for your iPhone, iPad and / or iPod Touch. You use devices you already own to create an instant bluetooth spy camera. One device acts as the camera, and the other receives the video / audio.

For instance, you could connect your iPhone to your friend’s iPad. Then set your iPhone down in an inconspicuous spot such as a desktop or somewhere it can blend in with the surroundings. From the next room, you could watch everything the iPhone’s camera sees from your friend’s iPad screen and control recording.

If someone notices the iPhone, press the kill button to exit the app. If they pick it up to investigate, all they will see is the home screen. You quickly enter saying, “I thought I left that in here! Thanks for finding it.”

325x200-iPhone-Streamer250x200-iPhone-Receiver


Defray ransomware removal and data decryption

Defray ransomware removal and data decryption

Get an in-depth security report on the new Defray ransomware that zeroes in on high-profile targets, encrypts proprietary data and holds it for ransom. Targeted cyber-attacks with crypto ransomware is currently the exception rather than the rule. Large-scale extortion campaigns indiscriminate about victim types apparently pay off better and are therefore a much more common […]

Arena virus: how to recover .arena extension files (Sep. 2017)

Arena virus: how to recover .arena extension files (Sep. 2017)

New persona of the Crysis ransomware has been released that appends the .arena extension to encrypted data and still implements encryption securely. The crypto ransomware breed known as Crysis, or Dharma, appears to be gearing up for a rise. It has been spawning malicious descendants almost on a weekly basis since early August 2017, having […]

EMPTY ransomware: decrypt .EMPTY virus files

EMPTY ransomware: decrypt .EMPTY virus files

The CryptoMix ransomware strand keeps spewing out new variants, the latest one acting very much like predecessors but appending the .EMPTY extension to files. It’s hard to think of a crypto malware strand that stays the same over time and doesn’t spawn spinoffs that inherit basic hallmarks of the original infection while adding some novelty […]

Cesar ransomware virus: how to decrypt .cesar files

Cesar ransomware virus: how to decrypt .cesar files

This article provides comprehensive details of the new Crysis / Dharma ransomware variant that appends the .cesar or .cezar extension to encrypted files. The Crysis ransomware, previously known as Dharma, has suddenly awoken after several months of inactivity. Moreover, the halt was accompanied by an anonymous dump of master decryption keys in late May 2017. […]

SyncCrypt ransomware: decrypt .kk virus files

SyncCrypt ransomware: decrypt .kk virus files

The new SyncCrypt ransomware acts more evasively than others, appends the .kk extension to encrypted files and drops ransom notes named readme.html/txt. The authors of SyncCrypt, a new uncrackable ransom Trojan that blemishes encoded files with the .kk extension token, have managed to break quite a bit of new ground with the way their contrivance […]

Lukitus/Locky ransomware removal: how to decrypt .lukitus virus files

Lukitus/Locky ransomware removal: how to decrypt .lukitus virus files

The Locky ransomware gets another facelift as its new variant is released, this time appending one’s encrypted files with the .lukitus extension. The behavior of Locky, one of the most widespread ransomware strains to date, shows how dynamic the online extortion environment is. This lineage has produced new offspring less than one week after its […]

Mamba ransomware removal and files decryptor

Mamba ransomware removal and files decryptor

Learn how the Mamba ransomware differs from commonplace file-encrypting infections, how to avoid it and what to do if it has already infected a computer. The ransomware called Mamba, or HDDCryptor, isn’t new. Those who keep track of big cybersecurity incidents might recall the defiant incursion against the San Francisco Municipal Transportation Agency that took […]

Decrypt .diablo6 files – Diablo6 variant of Locky ransomware [upd. Oct. 2017]

Decrypt .diablo6 files – Diablo6 variant of Locky ransomware [upd. Oct. 2017]

Breaking news of the day is the emergence of a new Locky ransomware iteration that arrives with spam and appends the .diablo6 extension to encrypted files. Although the security community started feeling confident that the once dominating Locky ransomware vanished from the radar, it made a reappearance that’s shaping up to be the next big […]

Recover .726 files virus: GlobeImposter 2.0 ransomware removal

Recover .726 files virus: GlobeImposter 2.0 ransomware removal

GlobeImposter ransomware continues wreaking havoc with its super-frequent updates, the latest one introducing the .726 extension added to hostage files. The GlobeImposter ransomware strand is currently outperforming all the other lineages in the competition. Its makers are coining fresh variants every other day, thus flooding the malicious ecosystem with a bevy of concurrently circulating samples. […]

Gryphon ransomware: decrypt .gryphon files and remove virus

Gryphon ransomware: decrypt .gryphon files and remove virus

Learn how the new Gryphon ransomware gains a foothold on a computer, how it affects victim’s personal data, and how to try and restore hostage files for free. The ransomware ecosystem has been generally idle over the past several weeks, with nothing but crude, poorly coded samples popping up once in a while. The strain […]

Page 2 of 17«12345»10...Last »