Go from iPhone to Spy Phone!

Spy Bot is the surveillance app that turns your iPad, iPhone and iPod Touch into an instant spy phone / bluetooth spy camera! Use your iPhone, iPad or iPod Touch’s camera to stream live video and audio to connected devices up to 50 feet away! Perfect for situations where you can’t be in the room, but need to know what’s going on.

Download Spy Bot
Available @ the App Store

Spy Bot, the only Bluetooth Surveillance App for iOS


Stream Video

Spy Bot links two i-devices together to create an instant surveillance camera setup. Set up in an inconspicuous spot and watch from up to 50 feet away.

Record Discreetly

You can discreetly control recording and streaming from up to 50 ft away. Recorded videos save to the streaming devices ‘My Videos’ tab.

Bluetooth

Using Bluetooth to connect the devices makes Spy Bot extremely versatile. Set up the surveillance app anywhere – no wifi or carrier signal needed.

Upload & Share

What fun is secretly recording video if no one sees it? Upload captured videos and compete for dope prizes! Be sure to keep it classy, though.

Protect Yourself

If your hidden camera is about to be discovered, use the “Kill” button to exit the program on both devices to the main screen, protecting your identity.


250x500-iPhone5

How does Spy Bot work?

Simply put, Spy Bot works as a surveillance app for your iPhone, iPad and / or iPod Touch. You use devices you already own to create an instant bluetooth spy camera. One device acts as the camera, and the other receives the video / audio.

For instance, you could connect your iPhone to your friend’s iPad. Then set your iPhone down in an inconspicuous spot such as a desktop or somewhere it can blend in with the surroundings. From the next room, you could watch everything the iPhone’s camera sees from your friend’s iPad screen and control recording.

If someone notices the iPhone, press the kill button to exit the app. If they pick it up to investigate, all they will see is the home screen. You quickly enter saying, “I thought I left that in here! Thanks for finding it.”

325x200-iPhone-Streamer250x200-iPhone-Receiver


Remove unTabs virus in Chrome, Firefox, IE and Safari

Remove unTabs virus in Chrome, Firefox, IE and Safari

Learn how to get rid of unTabs, a potentially unwanted program that gets installed on its own, changes the default search engine and displays nagging ads. It’s amazing how a commendable idea can be implemented in a way that makes people want to opt out. The application called unTabs is a shining example of such […]

Taskeng.exe virus popups removal in Windows

Taskeng.exe virus popups removal in Windows

The issue with Taskeng.exe popup windows fully demonstrates the blurred gist of present-day malware, where the line between legit and malicious is very thin. There are two different facets of the Taskeng.exe. On the one hand, it is a genuine Windows process referred to as the Task Scheduler Engine. Residing in C:\Windows\System32 directory, this entity […]

How to decrypt .wlu files – new Jaff ransomware extension

How to decrypt .wlu files – new Jaff ransomware extension

A new variant of the Jaff ransomware is out that appends the .wlu extension to enciphered files, presents itself as Jaff Decryptor and uses new ransom notes. It took the makers of the Jaff file-encrypting virus less than two weeks to contrive and launch a fresh edition of their nasty program. The bad news is […]

XData ransomware

XData ransomware

New ransomware called XData is rapidly making the rounds, so take precautions to avoid it and learn how to decrypt .~xdata~ files if the attack has occurred. Security analysts are accustomed to recurrent ransomware outbreaks, but few crypto infections spread like wildfire. The aggressive strain dubbed XData, which surfaced on May 18, 2017, has managed […]

Wanna Cry ransomware attack: dissecting the campaign

Wanna Cry ransomware attack: dissecting the campaign

Get the lowdown on the recent Wanna Cry, or Wana Decrypt0r, ransomware wave that took data on tens of thousands of computers hostage in less than a week. One of the heftiest ransomware outbreaks to date took root on May 12, 2017. A strain called Wanna Cry started making the rounds in a stealthy fashion, […]

Wanna Decryptor 2.0 ransomware removal (upd. 19.05.2017)

Wanna Decryptor 2.0 ransomware removal (upd. 19.05.2017)

The new Wana Decrypt0r 2.0 ransomware (aka Wanna Decryptor), which appends the .WNCRY extension to encrypted files, is taking online extortion attacks to a whole new level. Although extortion through crypto viruses has been around for years, it’s hard to recall a ransomware sample as rapidly expanding as Wana Decrypt0r 2.0. Its worldwide distribution took […]

How to remove Jaff ransomware virus and decrypt .jaff files

How to remove Jaff ransomware virus and decrypt .jaff files

Get a full security profile of Locky ransomware’s new Jaff variant and learn data recovery options that may put the Bitcoin ransom out of the equation. May 2017 update: The latest Jaff ransomware edition uses .wlu extension for encrypted files A new sample of file-encrypting ransomware, which is most likely a spinoff of the Locky […]

Vidplayy virus removal in Firefox, Chrome, IE and Safari

Vidplayy virus removal in Firefox, Chrome, IE and Safari

Online fraudsters are in for a new scam campaign featuring rogue invitation messages that recommend recipients to visit Vidplayy.com site, which is not safe. Obviously, computer crooks are no longer fully comfortable with old school browser hijacking techniques. A recent wave of such attacks involves a significant extent of social engineering. One of the unusual […]

Netflix hack: attacker unleashes his rage over failed extortion

Netflix hack: attacker unleashes his rage over failed extortion

Recently leaked 10 episodes of the “Orange Is the New Black” show’s season 5 have demonstrated how vulnerable entertainment companies are in face of hacking. A newsmaking hack incident as of late April 2017 involving Netflix and a related media company became a serious wakeup call for proprietors of popular streaming video services. A threat […]

ThunderCrypt virus: decrypt files and remove ransomware

ThunderCrypt virus: decrypt files and remove ransomware

This entry provides the low-down on the new ThunderCrypt ransomware, which uses asymmetric cipher to lock files and demands Bitcoins for decryption. Unfortunately, cryptography isn’t entirely about benign scope of use these days. This domain of applied science was originally meant to secure communication, data transfer and information storage. However, cybercrooks ventured into turning this […]

Page 3 of 16«12345»10...Last »