Go from iPhone to Spy Phone!

Spy Bot is the surveillance app that turns your iPad, iPhone and iPod Touch into an instant spy phone / bluetooth spy camera! Use your iPhone, iPad or iPod Touch’s camera to stream live video and audio to connected devices up to 50 feet away! Perfect for situations where you can’t be in the room, but need to know what’s going on.

Download Spy Bot
Available @ the App Store

Spy Bot, the only Bluetooth Surveillance App for iOS


Stream Video

Spy Bot links two i-devices together to create an instant surveillance camera setup. Set up in an inconspicuous spot and watch from up to 50 feet away.

Record Discreetly

You can discreetly control recording and streaming from up to 50 ft away. Recorded videos save to the streaming devices ‘My Videos’ tab.

Bluetooth

Using Bluetooth to connect the devices makes Spy Bot extremely versatile. Set up the surveillance app anywhere – no wifi or carrier signal needed.

Upload & Share

What fun is secretly recording video if no one sees it? Upload captured videos and compete for dope prizes! Be sure to keep it classy, though.

Protect Yourself

If your hidden camera is about to be discovered, use the “Kill” button to exit the program on both devices to the main screen, protecting your identity.


250x500-iPhone5

How does Spy Bot work?

Simply put, Spy Bot works as a surveillance app for your iPhone, iPad and / or iPod Touch. You use devices you already own to create an instant bluetooth spy camera. One device acts as the camera, and the other receives the video / audio.

For instance, you could connect your iPhone to your friend’s iPad. Then set your iPhone down in an inconspicuous spot such as a desktop or somewhere it can blend in with the surroundings. From the next room, you could watch everything the iPhone’s camera sees from your friend’s iPad screen and control recording.

If someone notices the iPhone, press the kill button to exit the app. If they pick it up to investigate, all they will see is the home screen. You quickly enter saying, “I thought I left that in here! Thanks for finding it.”

325x200-iPhone-Streamer250x200-iPhone-Receiver


Roshalock 2.00 ransomware (All_Your_Documents.rar) removal and decryption

Roshalock 2.00 ransomware (All_Your_Documents.rar) removal and decryption

The ransomware called Roshalock 2.00 is unusual because it archives a victim’s personal files and encrypts the RAR unlock key to prevent ransom-free recovery. Some ransom Trojans encode their preys’ valuable data and then perform the extortion part of the attack proper. Others lock files down by moving them to a password-protected archive. The new […]

How to decrypt no_more_ransom files (April 2017 – gayferber@gmail.com)

How to decrypt no_more_ransom files (April 2017 – gayferber@gmail.com)

Get clear-cut instructions on removing the Shade, or Troldesh, ransomware and decrypting .no_more_ransom extension files that this trojan holds hostage. The Shade ransomware, alias Troldesh, locks down a victim’s personal data with strong symmetric cryptosystem and requests money for decryption. Its current variant jumbles filenames beyond recognition and blemishes them with the ironical .no_more_ransom extension, […]

Decrypt and remove SAGE 2.2 ransomware

Decrypt and remove SAGE 2.2 ransomware

SAGE 2.2 ransomware attacks computers surreptitiously and uses top-notch encryption to lock victims’ files, so it is a formidable adversary to defeat. Security analysts have had quite a bit of success lately in cracking the encryption applied by different ransom Trojans. This favorable trend, however, hasn’t reached the new SAGE 2.2 ransomware. Similarly to the […]

TorrentLocker ransomware: decrypt files and remove virus

TorrentLocker ransomware: decrypt files and remove virus

This report encompasses all noteworthy details about the new TorrentLocker ransomware variant and provides best practice tips to decrypt hostage files. The story behind the crypto ransomware called TorrentLocker isn’t as prosaic as it may appear at first sight. While it goes basically the same route as most file-encrypting infections in terms of the modus […]

EasyPDFCombine virus: uninstall Easy PDF Combine toolbar

EasyPDFCombine virus: uninstall Easy PDF Combine toolbar

Learn how to remove the app called EasyPDFCombine, which hijacks a browser and redirects web traffic while claiming to deliver a PDF files merging feature. Some unscrupulous software developers prefer easy profit over ethical marketing work. While trying to engage as many people as possible with their service, the authors of the EasyPDFCombine application leverage […]

Fancy Bear tracking Ukrainian artillery units

Fancy Bear tracking Ukrainian artillery units

The blood-shedding military conflict in the East Ukrainian Donbas region is assuming new hybrid characteristics. The Ukrainian army has been confronted with a deadly tandem of Russia-backed rebels and Russian regular military forces since 2014. According to a recent investigation by CrowdStrike, the theater of war here turns out to be an explosive mix of […]

Remove StartPageing123 virus from Chrome, Firefox, Safari, IE

Remove StartPageing123 virus from Chrome, Firefox, Safari, IE

The browser hijacker referred to as StartPageing123 is meant to mess around with one’s web surfing in pursuit of traffic monetization and malvertising. The computer infection to be analyzed in this entry reflects the blurred essence of browser malware. Having a look at the StartPageing123 web page doesn’t reveal anything malicious or fishy – it […]

How to decrypt ransomware

How to decrypt ransomware

File-encrypting ransomware is undoubtedly the worst type of malicious code as of yet. In case of such an attack, simply removing the infection is not enough. Decrypting hostage data is the actual challenge victims are confronted with. The ransomware threat landscape is heterogeneous. Some samples have weak crypto, with the secret decryption key being embedded […]

Sage 2.0 ransomware decryption and removal tutorial

Sage 2.0 ransomware decryption and removal tutorial

Stay on top of the threats emanating from Sage ransomware, implement proper damage mitigation measures and restore encrypted files without paying the ransom. The ransom trojan called Sage poses just as much risk to home users and enterprises as the devastating Locky and Cerber strains. In fact, experts believe this infection is being operated by […]

Qtipr (qtipr.com) virus removal from Firefox, Chrome and IE browsers

Qtipr (qtipr.com) virus removal from Firefox, Chrome and IE browsers

The necessity to get rid of qtipr.com redirect virus stems from its adverse impact upon a victim’s privacy and serenity during Internet surfing sessions. The ability to define web browsing preferences is the best thing since sliced bread. This way, users can adjust their online activity to a specific lifestyle and interests of theirs. Unfortunately, […]

Page 7 of 17« First...«56789»10...Last »