Go from iPhone to Spy Phone!

Spy Bot is the surveillance app that turns your iPad, iPhone and iPod Touch into an instant spy phone / bluetooth spy camera! Use your iPhone, iPad or iPod Touch’s camera to stream live video and audio to connected devices up to 50 feet away! Perfect for situations where you can’t be in the room, but need to know what’s going on.

Download Spy Bot
Available @ the App Store

Spy Bot, the only Bluetooth Surveillance App for iOS


Stream Video

Spy Bot links two i-devices together to create an instant surveillance camera setup. Set up in an inconspicuous spot and watch from up to 50 feet away.

Record Discreetly

You can discreetly control recording and streaming from up to 50 ft away. Recorded videos save to the streaming devices ‘My Videos’ tab.

Bluetooth

Using Bluetooth to connect the devices makes Spy Bot extremely versatile. Set up the surveillance app anywhere – no wifi or carrier signal needed.

Upload & Share

What fun is secretly recording video if no one sees it? Upload captured videos and compete for dope prizes! Be sure to keep it classy, though.

Protect Yourself

If your hidden camera is about to be discovered, use the “Kill” button to exit the program on both devices to the main screen, protecting your identity.


250x500-iPhone5

How does Spy Bot work?

Simply put, Spy Bot works as a surveillance app for your iPhone, iPad and / or iPod Touch. You use devices you already own to create an instant bluetooth spy camera. One device acts as the camera, and the other receives the video / audio.

For instance, you could connect your iPhone to your friend’s iPad. Then set your iPhone down in an inconspicuous spot such as a desktop or somewhere it can blend in with the surroundings. From the next room, you could watch everything the iPhone’s camera sees from your friend’s iPad screen and control recording.

If someone notices the iPhone, press the kill button to exit the app. If they pick it up to investigate, all they will see is the home screen. You quickly enter saying, “I thought I left that in here! Thanks for finding it.”

325x200-iPhone-Streamer250x200-iPhone-Receiver


How to remove Jaff ransomware virus and decrypt .jaff files

How to remove Jaff ransomware virus and decrypt .jaff files

Get a full security profile of Locky ransomware’s new Jaff variant and learn data recovery options that may put the Bitcoin ransom out of the equation. May 2017 update: The latest Jaff ransomware edition uses .wlu extension for encrypted files A new sample of file-encrypting ransomware, which is most likely a spinoff of the Locky […]

Vidplayy virus removal in Firefox, Chrome, IE and Safari

Vidplayy virus removal in Firefox, Chrome, IE and Safari

Online fraudsters are in for a new scam campaign featuring rogue invitation messages that recommend recipients to visit Vidplayy.com site, which is not safe. Obviously, computer crooks are no longer fully comfortable with old school browser hijacking techniques. A recent wave of such attacks involves a significant extent of social engineering. One of the unusual […]

Netflix hack: attacker unleashes his rage over failed extortion

Netflix hack: attacker unleashes his rage over failed extortion

Recently leaked 10 episodes of the “Orange Is the New Black” show’s season 5 have demonstrated how vulnerable entertainment companies are in face of hacking. A newsmaking hack incident as of late April 2017 involving Netflix and a related media company became a serious wakeup call for proprietors of popular streaming video services. A threat […]

ThunderCrypt virus: decrypt files and remove ransomware

ThunderCrypt virus: decrypt files and remove ransomware

This entry provides the low-down on the new ThunderCrypt ransomware, which uses asymmetric cipher to lock files and demands Bitcoins for decryption. Unfortunately, cryptography isn’t entirely about benign scope of use these days. This domain of applied science was originally meant to secure communication, data transfer and information storage. However, cybercrooks ventured into turning this […]

Onion ransomware: decrypt .onion virus extension files

Onion ransomware: decrypt .onion virus extension files

The .onion file virus appears to be the latest incarnation of the Dharma ransomware, a high-profile threat using cryptography to take data hostage. The CrySiS / Dharma ransomware family is one of the old stagers on the arena of online extortion. It stands out from the rest in a couple of ways. The cybercriminals in […]

How to uninstall KuaiZip virus ads

How to uninstall KuaiZip virus ads

If the KuaiZip application has ended up on a PC, removing it is a necessary security measure as it displays annoying ads and promotes other malicious software. Using the KuaiZip software is a mixed blessing. On the one hand, it claims to archive data with higher compression ratio than competing tools WinRAR, WinZip and 7-Zip […]

Nemesis decryptor: redeem encrypted files from Cry9/Nemesis ransomware

Nemesis decryptor: redeem encrypted files from Cry9/Nemesis ransomware

This tutorial highlights key characteristics of the Nemesis ransomware variant called Cry9 and provides efficient instructions to restore hostage files. No other computer threat compares to ransomware when it comes to prevalence and troubleshooting difficulties. The threat actors involved in this illegal cyber-borne business have literally weaponized cryptography, an originally benign field of science. By […]

“The requested resource is in use” virus popups in Windows

“The requested resource is in use” virus popups in Windows

Learn what infection displays ‘The requested resource is in use‘ error notifications when certain applications are launched, and how to fix the problem. In a way, the computer threat landscape is reminiscent of real-world criminal plots, with villains and their accomplices working in tandem to pull off wicked felonies. Recent evidence of such a similarity […]

AES-NI Ransomware removal: decrypt .aes_ni_0day files

AES-NI Ransomware removal: decrypt .aes_ni_0day files

Users who got their personal files encrypted and appended with the .aes_ni_0day or .aes256 extension should leverage this tutorial for recovery assistance. Just like fingerprints in a real-world crime investigation, every ransomware attack is accompanied by unique IOCs (indicators of compromise) that make it possible to identify the specific crypto threat and the family it […]

Eccentric “Rensenware” infection demands Touhou game score instead of Bitcoin

Eccentric “Rensenware” infection demands Touhou game score instead of Bitcoin

A new crypto threat called Rensenware is breaking new ground with its unique tactic, where it encourages victims to play a game rather than cough up money. In a move that hardly anyone in the security community could possibly anticipate, a questionably judicious individual going by Twitter nickname Tvple Eraser has made quite an appearance […]

Page 2 of 14«12345»10...Last »