Go from iPhone to Spy Phone!

Spy Bot is the surveillance app that turns your iPad, iPhone and iPod Touch into an instant spy phone / bluetooth spy camera! Use your iPhone, iPad or iPod Touch’s camera to stream live video and audio to connected devices up to 50 feet away! Perfect for situations where you can’t be in the room, but need to know what’s going on.

Download Spy Bot
Available @ the App Store

Spy Bot, the only Bluetooth Surveillance App for iOS


Stream Video

Spy Bot links two i-devices together to create an instant surveillance camera setup. Set up in an inconspicuous spot and watch from up to 50 feet away.

Record Discreetly

You can discreetly control recording and streaming from up to 50 ft away. Recorded videos save to the streaming devices ‘My Videos’ tab.

Bluetooth

Using Bluetooth to connect the devices makes Spy Bot extremely versatile. Set up the surveillance app anywhere – no wifi or carrier signal needed.

Upload & Share

What fun is secretly recording video if no one sees it? Upload captured videos and compete for dope prizes! Be sure to keep it classy, though.

Protect Yourself

If your hidden camera is about to be discovered, use the “Kill” button to exit the program on both devices to the main screen, protecting your identity.


250x500-iPhone5

How does Spy Bot work?

Simply put, Spy Bot works as a surveillance app for your iPhone, iPad and / or iPod Touch. You use devices you already own to create an instant bluetooth spy camera. One device acts as the camera, and the other receives the video / audio.

For instance, you could connect your iPhone to your friend’s iPad. Then set your iPhone down in an inconspicuous spot such as a desktop or somewhere it can blend in with the surroundings. From the next room, you could watch everything the iPhone’s camera sees from your friend’s iPad screen and control recording.

If someone notices the iPhone, press the kill button to exit the app. If they pick it up to investigate, all they will see is the home screen. You quickly enter saying, “I thought I left that in here! Thanks for finding it.”

325x200-iPhone-Streamer250x200-iPhone-Receiver


MOLE03 ransomware: how to decrypt .MOLE03 files

MOLE03 ransomware: how to decrypt .MOLE03 files

Brand new variant of the CryptoMix ransomware is out that speckles encrypted files with the .MOLE03 extension and still encrypts them beyond regular recovery. Things are apparently going well for the architects of the CryptoMix ransomware campaign. They keep on coining new versions, one in two weeks on average. This continuous refreshing of the malicious […]

Remove and decrypt Cryakl ransomware virus

Remove and decrypt Cryakl ransomware virus

Being infected with the Cryakl ransomware is a serious predicament as most of its variants are uncrackable due to threat actors’ robust operations security. Some ransomware strands can boast sleek design of GUIs and full automation of the extortion chain. Others look crude and even primitive. Although it may seem that pests representing the latter […]

Fenrir ransomware: removal and decryption techniques

Fenrir ransomware: removal and decryption techniques

New ransom Trojan called Fenrir uses an unusual file tweaking method and proliferates via booby-trapped software downloads, clearly trying to be different. There aren’t many ransomware species out there that go their own route in terms of the attack tactics and data impact. The specimen referred to as Fenrir is one of the few that […]

CRBR Encryptor virus: remove and decrypt ransomware files

CRBR Encryptor virus: remove and decrypt ransomware files

The Cerber ransomware update history now includes an entry on CRBR Encryptor, the latest version that assumed new characteristics but isn’t a game changer. As opposed to ransomware strands that sprinkle new iterations once or several times a week, the Cerber family is way more static. Perhaps that’s because it boasts quality stuffing, including the […]

MOLE01 ransomware virus – how to decrypt .MOLE01 files

MOLE01 ransomware virus – how to decrypt .MOLE01 files

New CryptoMix ransomware variant has been discovered that subjoins the .MOLE01 extension to encrypted files and still drops _HELP_INSTRUCTION.txt ransom notes. The cyber perpetrators in charge of the CryptoMix / Revenge ransomware family appear to have a really weird take on math. The latest iteration of their code launched around July 7 has switched to […]

Decrypt and remove .aleta file extension ransomware (upd. July 16)

Decrypt and remove .aleta file extension ransomware (upd. July 16)

Learn how the .aleta file variant of the BTCWare strain manifests itself and try to restore encrypted files without submitting cryptocurrency to the attacker. The BTCWare crypto ransomware strand keeps on expanding. Although, to their credit, security analysts have been able to devise crack tools for several previous iterations of this family, each new sample […]

Mole00 ransomware: how to decrypt virus .MOLE00 files

Mole00 ransomware: how to decrypt virus .MOLE00 files

Learn how to remove MOLE00 ransomware strain from Windows computer and restore encrypted .MOLE00 extension files without submitting the ransom to attackers. July 2017 update: The most recent version of MOLE ransomware is .MOLE01 The Mole ransomware family engages much more social engineering in the attack chain than the vast majority of crypto threats in […]

Decrypt .loptr files – Locky ransomware virus variant

Decrypt .loptr files – Locky ransomware virus variant

This post provides analysis of the Locky ransomware edition that appends the .loptr extension to encrypted files and leaves loptr-[4_chars].htm ransom note. Some strains of ransomware surface and quickly vanish to never come back, but some evolve in order not to become stationary targets. The latter trend mainly applies to lineages of crypto malware architected […]

Perfc.dat file makes Windows immune to Petya/NotPetya ransomware

Perfc.dat file makes Windows immune to Petya/NotPetya ransomware

Researchers have found a way to protect a Windows computer against the current outbreak of the revamped Petya ransomware using the ‘perfc‘ file trigger. A new massive ransomware distribution wave, which took root as of June 28, is instilling fear with its top-notch proliferation tactics and devastating effect on compromised computers. This time, it’s a […]

Petya ransomware removal and system recovery (upd. June 29)

Petya ransomware removal and system recovery (upd. June 29)

Learn how the Petya ransomware is different from other crypto threats, why it is considered a high-profile infection, and how to go about the attack. The ransomware called Petya illustrates the fact that crypto viruses are evolving over time. The perpetrators are no longer content with the tactic where victims’ personal data is held for […]

Page 3 of 17«12345»10...Last »