Go from iPhone to Spy Phone!

Spy Bot is the surveillance app that turns your iPad, iPhone and iPod Touch into an instant spy phone / bluetooth spy camera! Use your iPhone, iPad or iPod Touch’s camera to stream live video and audio to connected devices up to 50 feet away! Perfect for situations where you can’t be in the room, but need to know what’s going on.

Download Spy Bot
Available @ the App Store

Spy Bot, the only Bluetooth Surveillance App for iOS


Stream Video

Spy Bot links two i-devices together to create an instant surveillance camera setup. Set up in an inconspicuous spot and watch from up to 50 feet away.

Record Discreetly

You can discreetly control recording and streaming from up to 50 ft away. Recorded videos save to the streaming devices ‘My Videos’ tab.

Bluetooth

Using Bluetooth to connect the devices makes Spy Bot extremely versatile. Set up the surveillance app anywhere – no wifi or carrier signal needed.

Upload & Share

What fun is secretly recording video if no one sees it? Upload captured videos and compete for dope prizes! Be sure to keep it classy, though.

Protect Yourself

If your hidden camera is about to be discovered, use the “Kill” button to exit the program on both devices to the main screen, protecting your identity.


250x500-iPhone5

How does Spy Bot work?

Simply put, Spy Bot works as a surveillance app for your iPhone, iPad and / or iPod Touch. You use devices you already own to create an instant bluetooth spy camera. One device acts as the camera, and the other receives the video / audio.

For instance, you could connect your iPhone to your friend’s iPad. Then set your iPhone down in an inconspicuous spot such as a desktop or somewhere it can blend in with the surroundings. From the next room, you could watch everything the iPhone’s camera sees from your friend’s iPad screen and control recording.

If someone notices the iPhone, press the kill button to exit the app. If they pick it up to investigate, all they will see is the home screen. You quickly enter saying, “I thought I left that in here! Thanks for finding it.”

325x200-iPhone-Streamer250x200-iPhone-Receiver


Nemesis decryptor: redeem encrypted files from Cry9/Nemesis ransomware

Nemesis decryptor: redeem encrypted files from Cry9/Nemesis ransomware

This tutorial highlights key characteristics of the Nemesis ransomware variant called Cry9 and provides efficient instructions to restore hostage files. No other computer threat compares to ransomware when it comes to prevalence and troubleshooting difficulties. The threat actors involved in this illegal cyber-borne business have literally weaponized cryptography, an originally benign field of science. By […]

“The requested resource is in use” virus popups in Windows

“The requested resource is in use” virus popups in Windows

Learn what infection displays ‘The requested resource is in use‘ error notifications when certain applications are launched, and how to fix the problem. In a way, the computer threat landscape is reminiscent of real-world criminal plots, with villains and their accomplices working in tandem to pull off wicked felonies. Recent evidence of such a similarity […]

AES-NI Ransomware removal: decrypt .aes_ni_0day files

AES-NI Ransomware removal: decrypt .aes_ni_0day files

Users who got their personal files encrypted and appended with the .aes_ni_0day or .aes256 extension should leverage this tutorial for recovery assistance. Just like fingerprints in a real-world crime investigation, every ransomware attack is accompanied by unique IOCs (indicators of compromise) that make it possible to identify the specific crypto threat and the family it […]

Eccentric “Rensenware” infection demands Touhou game score instead of Bitcoin

Eccentric “Rensenware” infection demands Touhou game score instead of Bitcoin

A new crypto threat called Rensenware is breaking new ground with its unique tactic, where it encourages victims to play a game rather than cough up money. In a move that hardly anyone in the security community could possibly anticipate, a questionably judicious individual going by Twitter nickname Tvple Eraser has made quite an appearance […]

Wcry ransomware: .wcry files decryptor and virus removal

Wcry ransomware: .wcry files decryptor and virus removal

Update 13.05.2017: This information also applies to an updated Wcry variant called Wana Decrypt0r 2.0 active as of May 2017, which uses the .WNCRY extension to stain hostage files. Get a viable fix for the Wcry ransomware issue, where all important files on a computer get encrypted with AES algorithm and a ransom of 0.3 […]

Microsoft Warning Alert scam: remove fake virus popups

Microsoft Warning Alert scam: remove fake virus popups

Get rid of the Microsoft Warning Virus scam issue, which is on the rise with fake threat detection reports and recommendations to call an impostor technician. Tech support scams have always been a goldmine for ne’er-do-wells who seek easy gain. These manipulative campaigns revolve around the use of browser hijackers, screen lockers or popup viruses […]

Critical Chrome Update scam: get rid of virus popups

Critical Chrome Update scam: get rid of virus popups

A new scam wave is underway that dupes computer users into applying a rogue Critical Chrome Update, which ends up installing malicious software instead. The present-day social engineering techniques aren’t restricted to things like dumpster diving, tailgating, spear phishing or cold-calling. In fact, browser hijacking does the trick quite well for the online realm. This […]

Remove nova.rambler.ru virus from Firefox, Chrome, IE and Safari

Remove nova.rambler.ru virus from Firefox, Chrome, IE and Safari

When confronted with a browser hijacker like nova.rambler.ru, PC users are unable to opt out the rogue service and define their desired Internet preferences. Every browser hijack scenario follows a uniform route. The infection gets control of custom browsing settings without asking for the victim’s consent and reroutes online traffic to a page or set […]

Launchpage.org virus removal from Firefox, Chrome, IE and Safari

Launchpage.org virus removal from Firefox, Chrome, IE and Safari

This security report dissects the Launchpage.org malvertising campaign aimed at redirecting web browsers to a rogue search engine and monetizing this traffic. A lot of things in the malware world are blurred to an extent that telling clearly malicious code from a legitimate app may be problematic. Some perpetrating programs operate straightforwardly enough to deny […]

Decrypt Cerber Rans0mware: *_READ_THIS_FILE_* virus removal

Decrypt Cerber Rans0mware: *_READ_THIS_FILE_* virus removal

Online extortionists have launched a campaign involving an updated strain called Cerber Rans0mware, which features new *_READ_THIS_FILE_* ransom notes. In the cybersecurity context, the term Cerber denotes a prolific specimen of file-encrypting ransomware. It is one of the very few strains sticking around for more than a year, while most crapware samples from this category […]

Page 2 of 14«12345»10...Last »