Go from iPhone to Spy Phone!

Spy Bot is the surveillance app that turns your iPad, iPhone and iPod Touch into an instant spy phone / bluetooth spy camera! Use your iPhone, iPad or iPod Touch’s camera to stream live video and audio to connected devices up to 50 feet away! Perfect for situations where you can’t be in the room, but need to know what’s going on.

Download Spy Bot
Available @ the App Store

Spy Bot, the only Bluetooth Surveillance App for iOS


Stream Video

Spy Bot links two i-devices together to create an instant surveillance camera setup. Set up in an inconspicuous spot and watch from up to 50 feet away.

Record Discreetly

You can discreetly control recording and streaming from up to 50 ft away. Recorded videos save to the streaming devices ‘My Videos’ tab.

Bluetooth

Using Bluetooth to connect the devices makes Spy Bot extremely versatile. Set up the surveillance app anywhere – no wifi or carrier signal needed.

Upload & Share

What fun is secretly recording video if no one sees it? Upload captured videos and compete for dope prizes! Be sure to keep it classy, though.

Protect Yourself

If your hidden camera is about to be discovered, use the “Kill” button to exit the program on both devices to the main screen, protecting your identity.


250x500-iPhone5

How does Spy Bot work?

Simply put, Spy Bot works as a surveillance app for your iPhone, iPad and / or iPod Touch. You use devices you already own to create an instant bluetooth spy camera. One device acts as the camera, and the other receives the video / audio.

For instance, you could connect your iPhone to your friend’s iPad. Then set your iPhone down in an inconspicuous spot such as a desktop or somewhere it can blend in with the surroundings. From the next room, you could watch everything the iPhone’s camera sees from your friend’s iPad screen and control recording.

If someone notices the iPhone, press the kill button to exit the app. If they pick it up to investigate, all they will see is the home screen. You quickly enter saying, “I thought I left that in here! Thanks for finding it.”

325x200-iPhone-Streamer250x200-iPhone-Receiver


MOLE01 ransomware virus – how to decrypt .MOLE01 files

MOLE01 ransomware virus – how to decrypt .MOLE01 files

New CryptoMix ransomware variant has been discovered that subjoins the .MOLE01 extension to encrypted files and still drops _HELP_INSTRUCTION.txt ransom notes. The cyber perpetrators in charge of the CryptoMix / Revenge ransomware family appear to have a really weird take on math. The latest iteration of their code launched around July 7 has switched to […]

Decrypt and remove .aleta file extension ransomware (upd. July 16)

Decrypt and remove .aleta file extension ransomware (upd. July 16)

Learn how the .aleta file variant of the BTCWare strain manifests itself and try to restore encrypted files without submitting cryptocurrency to the attacker. The BTCWare crypto ransomware strand keeps on expanding. Although, to their credit, security analysts have been able to devise crack tools for several previous iterations of this family, each new sample […]

Mole00 ransomware: how to decrypt virus .MOLE00 files

Mole00 ransomware: how to decrypt virus .MOLE00 files

Learn how to remove MOLE00 ransomware strain from Windows computer and restore encrypted .MOLE00 extension files without submitting the ransom to attackers. July 2017 update: The most recent version of MOLE ransomware is .MOLE01 The Mole ransomware family engages much more social engineering in the attack chain than the vast majority of crypto threats in […]

Decrypt .loptr files – Locky ransomware virus variant

Decrypt .loptr files – Locky ransomware virus variant

This post provides analysis of the Locky ransomware edition that appends the .loptr extension to encrypted files and leaves loptr-[4_chars].htm ransom note. Some strains of ransomware surface and quickly vanish to never come back, but some evolve in order not to become stationary targets. The latter trend mainly applies to lineages of crypto malware architected […]

Perfc.dat file makes Windows immune to Petya/NotPetya ransomware

Perfc.dat file makes Windows immune to Petya/NotPetya ransomware

Researchers have found a way to protect a Windows computer against the current outbreak of the revamped Petya ransomware using the ‘perfc‘ file trigger. A new massive ransomware distribution wave, which took root as of June 28, is instilling fear with its top-notch proliferation tactics and devastating effect on compromised computers. This time, it’s a […]

Petya ransomware removal and system recovery (upd. June 29)

Petya ransomware removal and system recovery (upd. June 29)

Learn how the Petya ransomware is different from other crypto threats, why it is considered a high-profile infection, and how to go about the attack. The ransomware called Petya illustrates the fact that crypto viruses are evolving over time. The perpetrators are no longer content with the tactic where victims’ personal data is held for […]

Sorebrect ransomware – fileless malware exploits PsExec utility

Sorebrect ransomware – fileless malware exploits PsExec utility

The Sorebrect ransomware is more sophisticated than the average crypto strain because it boasts stealthy fileless execution and easily evades AV suites. Considering all ransom Trojans the same except their names is a wrong perception. Whereas the extortion scheme proper tends to be common ground, the modus operandi is a variable. The ransomware dubbed Sorebrect […]

Remove MOLE02 ransomware virus and decrypt .mole02 files (upd. July 03)

Remove MOLE02 ransomware virus and decrypt .mole02 files (upd. July 03)

It appears that CryptoMix virus is back again. Its fresh variant is labeled as MOLE02 ransomware. This update changes files extensions to .MOLE02 for all encrypted files. The new version of MOLE virus also uses new ransom note and Tor website. Ransom note text: !!!IMPORTANT INFORMATION!!! All of your files are encrypted with RSA 2048 […]

Erebus ransomware infects Linux web servers in South Korea

Erebus ransomware infects Linux web servers in South Korea

Since the crypto ransomware called Erebus is professionally designed and currently cannot be cracked, it is shaping up to be another serious security problem. There is no computer completely immune to ransomware. What is more, these threats are getting increasingly sophisticated over time. Even if one exercises due caution with files that go with malicious […]

Decrypt .master ransomware files – BTCWare virus variant

Decrypt .master ransomware files – BTCWare virus variant

A new version of the BTCWare ransom Trojan is out that appends the .master extension to encrypted files and drops a ransom note named !#_RESTORE_FILES_#!.inf. The evolution of the BTCWare crypto hoax is underway. Its latest edition has introduced a few external tweaks, while on the inside it is still the same, quite professionally tailored […]

Page 2 of 16«12345»10...Last »