Go from iPhone to Spy Phone!

Spy Bot is the surveillance app that turns your iPad, iPhone and iPod Touch into an instant spy phone / bluetooth spy camera! Use your iPhone, iPad or iPod Touch’s camera to stream live video and audio to connected devices up to 50 feet away! Perfect for situations where you can’t be in the room, but need to know what’s going on.

Download Spy Bot
Available @ the App Store

Spy Bot, the only Bluetooth Surveillance App for iOS


Stream Video

Spy Bot links two i-devices together to create an instant surveillance camera setup. Set up in an inconspicuous spot and watch from up to 50 feet away.

Record Discreetly

You can discreetly control recording and streaming from up to 50 ft away. Recorded videos save to the streaming devices ‘My Videos’ tab.

Bluetooth

Using Bluetooth to connect the devices makes Spy Bot extremely versatile. Set up the surveillance app anywhere – no wifi or carrier signal needed.

Upload & Share

What fun is secretly recording video if no one sees it? Upload captured videos and compete for dope prizes! Be sure to keep it classy, though.

Protect Yourself

If your hidden camera is about to be discovered, use the “Kill” button to exit the program on both devices to the main screen, protecting your identity.


250x500-iPhone5

How does Spy Bot work?

Simply put, Spy Bot works as a surveillance app for your iPhone, iPad and / or iPod Touch. You use devices you already own to create an instant bluetooth spy camera. One device acts as the camera, and the other receives the video / audio.

For instance, you could connect your iPhone to your friend’s iPad. Then set your iPhone down in an inconspicuous spot such as a desktop or somewhere it can blend in with the surroundings. From the next room, you could watch everything the iPhone’s camera sees from your friend’s iPad screen and control recording.

If someone notices the iPhone, press the kill button to exit the app. If they pick it up to investigate, all they will see is the home screen. You quickly enter saying, “I thought I left that in here! Thanks for finding it.”

325x200-iPhone-Streamer250x200-iPhone-Receiver


Critical Chrome Update scam: get rid of virus popups

Critical Chrome Update scam: get rid of virus popups

A new scam wave is underway that dupes computer users into applying a rogue Critical Chrome Update, which ends up installing malicious software instead. The present-day social engineering techniques aren’t restricted to things like dumpster diving, tailgating, spear phishing or cold-calling. In fact, browser hijacking does the trick quite well for the online realm. This […]

Remove nova.rambler.ru virus from Firefox, Chrome, IE and Safari

Remove nova.rambler.ru virus from Firefox, Chrome, IE and Safari

When confronted with a browser hijacker like nova.rambler.ru, PC users are unable to opt out the rogue service and define their desired Internet preferences. Every browser hijack scenario follows a uniform route. The infection gets control of custom browsing settings without asking for the victim’s consent and reroutes online traffic to a page or set […]

Launchpage.org virus removal from Firefox, Chrome, IE and Safari

Launchpage.org virus removal from Firefox, Chrome, IE and Safari

This security report dissects the Launchpage.org malvertising campaign aimed at redirecting web browsers to a rogue search engine and monetizing this traffic. A lot of things in the malware world are blurred to an extent that telling clearly malicious code from a legitimate app may be problematic. Some perpetrating programs operate straightforwardly enough to deny […]

Decrypt Cerber Rans0mware: *_READ_THIS_FILE_* virus removal

Decrypt Cerber Rans0mware: *_READ_THIS_FILE_* virus removal

Online extortionists have launched a campaign involving an updated strain called Cerber Rans0mware, which features new *_READ_THIS_FILE_* ransom notes. In the cybersecurity context, the term Cerber denotes a prolific specimen of file-encrypting ransomware. It is one of the very few strains sticking around for more than a year, while most crapware samples from this category […]

Remove Ads by TrafficStars virus from Firefox, Chrome, IE and Safari

Remove Ads by TrafficStars virus from Firefox, Chrome, IE and Safari

This entry dissects the shady facet of Ads by TrafficStars virus, including its distribution workflow and tips to get rid of the underlying malicious code. There’s a bevy of online services aimed at bridging the gap between merchants and publishers. This is certainly useful assistance that pushes numerous Internet businesses forward. Some parties involved in […]

PClock ransomware decryptor and remover

PClock ransomware decryptor and remover

Get exhaustive information on CryptoLocker replica called the PClock ransomware, including its background, distribution vectors and extortion methodology. PClock is one of the few present-day ransomware samples whose timeline goes back to early 2015. What is more, its look and feel has hardly changed over time. It is one of the numerous copycats of the […]

Kirk ransomware removal and .kirked files decryption

Kirk ransomware removal and .kirked files decryption

The architects of the Kirk ransomware campaign are apparently big fans of the Star Trek TV series as they use the apropos theme and terms for their warnings. With the ubiquity of file-encrypting Trojans floating around the worldwide web, it’s hard to surprise the community of security researchers these days. The threat actors have tried […]

Dharma ransomware decryptor and removal

Dharma ransomware decryptor and removal

Windows users infected with the Dharma ransomware are in for a serious security predicament, but there may still be a good chance to decrypt .dharma files. Dharma ransomware has been in the wild for about four months, and its extortion activities have affected thousands of end users along with hundreds of enterprise networks over this […]

Roshalock 2.00 ransomware (All_Your_Documents.rar) removal and decryption

Roshalock 2.00 ransomware (All_Your_Documents.rar) removal and decryption

The ransomware called Roshalock 2.00 is unusual because it archives a victim’s personal files and encrypts the RAR unlock key to prevent ransom-free recovery. Some ransom Trojans encode their preys’ valuable data and then perform the extortion part of the attack proper. Others lock files down by moving them to a password-protected archive. The new […]

How to decrypt no_more_ransom files (April 2017 – gayferber@gmail.com)

How to decrypt no_more_ransom files (April 2017 – gayferber@gmail.com)

Get clear-cut instructions on removing the Shade, or Troldesh, ransomware and decrypting .no_more_ransom extension files that this trojan holds hostage. The Shade ransomware, alias Troldesh, locks down a victim’s personal data with strong symmetric cryptosystem and requests money for decryption. Its current variant jumbles filenames beyond recognition and blemishes them with the ironical .no_more_ransom extension, […]

Page 4 of 15« First...«23456»10...Last »