Go from iPhone to Spy Phone!

Spy Bot is the surveillance app that turns your iPad, iPhone and iPod Touch into an instant spy phone / bluetooth spy camera! Use your iPhone, iPad or iPod Touch’s camera to stream live video and audio to connected devices up to 50 feet away! Perfect for situations where you can’t be in the room, but need to know what’s going on.

Download Spy Bot
Available @ the App Store

Spy Bot, the only Bluetooth Surveillance App for iOS


Stream Video

Spy Bot links two i-devices together to create an instant surveillance camera setup. Set up in an inconspicuous spot and watch from up to 50 feet away.

Record Discreetly

You can discreetly control recording and streaming from up to 50 ft away. Recorded videos save to the streaming devices ‘My Videos’ tab.

Bluetooth

Using Bluetooth to connect the devices makes Spy Bot extremely versatile. Set up the surveillance app anywhere – no wifi or carrier signal needed.

Upload & Share

What fun is secretly recording video if no one sees it? Upload captured videos and compete for dope prizes! Be sure to keep it classy, though.

Protect Yourself

If your hidden camera is about to be discovered, use the “Kill” button to exit the program on both devices to the main screen, protecting your identity.


250x500-iPhone5

How does Spy Bot work?

Simply put, Spy Bot works as a surveillance app for your iPhone, iPad and / or iPod Touch. You use devices you already own to create an instant bluetooth spy camera. One device acts as the camera, and the other receives the video / audio.

For instance, you could connect your iPhone to your friend’s iPad. Then set your iPhone down in an inconspicuous spot such as a desktop or somewhere it can blend in with the surroundings. From the next room, you could watch everything the iPhone’s camera sees from your friend’s iPad screen and control recording.

If someone notices the iPhone, press the kill button to exit the app. If they pick it up to investigate, all they will see is the home screen. You quickly enter saying, “I thought I left that in here! Thanks for finding it.”

325x200-iPhone-Streamer250x200-iPhone-Receiver


How to decrypt .wlu files – new Jaff ransomware extension

How to decrypt .wlu files – new Jaff ransomware extension

A new variant of the Jaff ransomware is out that appends the .wlu extension to enciphered files, presents itself as Jaff Decryptor and uses new ransom notes. It took the makers of the Jaff file-encrypting virus less than two weeks to contrive and launch a fresh edition of their nasty program. The bad news is […]

XData ransomware

XData ransomware

New ransomware called XData is rapidly making the rounds, so take precautions to avoid it and learn how to decrypt .~xdata~ files if the attack has occurred. Security analysts are accustomed to recurrent ransomware outbreaks, but few crypto infections spread like wildfire. The aggressive strain dubbed XData, which surfaced on May 18, 2017, has managed […]

Wanna Cry ransomware attack: dissecting the campaign

Wanna Cry ransomware attack: dissecting the campaign

Get the lowdown on the recent Wanna Cry, or Wana Decrypt0r, ransomware wave that took data on tens of thousands of computers hostage in less than a week. One of the heftiest ransomware outbreaks to date took root on May 12, 2017. A strain called Wanna Cry started making the rounds in a stealthy fashion, […]

Wanna Decryptor 2.0 ransomware removal (upd. 19.05.2017)

Wanna Decryptor 2.0 ransomware removal (upd. 19.05.2017)

The new Wana Decrypt0r 2.0 ransomware (aka Wanna Decryptor), which appends the .WNCRY extension to encrypted files, is taking online extortion attacks to a whole new level. Although extortion through crypto viruses has been around for years, it’s hard to recall a ransomware sample as rapidly expanding as Wana Decrypt0r 2.0. Its worldwide distribution took […]

How to remove Jaff ransomware virus and decrypt .jaff files

How to remove Jaff ransomware virus and decrypt .jaff files

Get a full security profile of Locky ransomware’s new Jaff variant and learn data recovery options that may put the Bitcoin ransom out of the equation. May 2017 update: The latest Jaff ransomware edition uses .wlu extension for encrypted files A new sample of file-encrypting ransomware, which is most likely a spinoff of the Locky […]

Vidplayy virus removal in Firefox, Chrome, IE and Safari

Vidplayy virus removal in Firefox, Chrome, IE and Safari

Online fraudsters are in for a new scam campaign featuring rogue invitation messages that recommend recipients to visit Vidplayy.com site, which is not safe. Obviously, computer crooks are no longer fully comfortable with old school browser hijacking techniques. A recent wave of such attacks involves a significant extent of social engineering. One of the unusual […]

Netflix hack: attacker unleashes his rage over failed extortion

Netflix hack: attacker unleashes his rage over failed extortion

Recently leaked 10 episodes of the “Orange Is the New Black” show’s season 5 have demonstrated how vulnerable entertainment companies are in face of hacking. A newsmaking hack incident as of late April 2017 involving Netflix and a related media company became a serious wakeup call for proprietors of popular streaming video services. A threat […]

ThunderCrypt virus: decrypt files and remove ransomware

ThunderCrypt virus: decrypt files and remove ransomware

This entry provides the low-down on the new ThunderCrypt ransomware, which uses asymmetric cipher to lock files and demands Bitcoins for decryption. Unfortunately, cryptography isn’t entirely about benign scope of use these days. This domain of applied science was originally meant to secure communication, data transfer and information storage. However, cybercrooks ventured into turning this […]

Onion ransomware: decrypt .onion virus extension files

Onion ransomware: decrypt .onion virus extension files

The .onion file virus appears to be the latest incarnation of the Dharma ransomware, a high-profile threat using cryptography to take data hostage. The CrySiS / Dharma ransomware family is one of the old stagers on the arena of online extortion. It stands out from the rest in a couple of ways. The cybercriminals in […]

How to uninstall KuaiZip virus ads

How to uninstall KuaiZip virus ads

If the KuaiZip application has ended up on a PC, removing it is a necessary security measure as it displays annoying ads and promotes other malicious software. Using the KuaiZip software is a mixed blessing. On the one hand, it claims to archive data with higher compression ratio than competing tools WinRAR, WinZip and 7-Zip […]

Page 4 of 17« First...«23456»10...Last »