Go from iPhone to Spy Phone!

Spy Bot is the surveillance app that turns your iPad, iPhone and iPod Touch into an instant spy phone / bluetooth spy camera! Use your iPhone, iPad or iPod Touch’s camera to stream live video and audio to connected devices up to 50 feet away! Perfect for situations where you can’t be in the room, but need to know what’s going on.

Download Spy Bot
Available @ the App Store

Spy Bot, the only Bluetooth Surveillance App for iOS


Stream Video

Spy Bot links two i-devices together to create an instant surveillance camera setup. Set up in an inconspicuous spot and watch from up to 50 feet away.

Record Discreetly

You can discreetly control recording and streaming from up to 50 ft away. Recorded videos save to the streaming devices ‘My Videos’ tab.

Bluetooth

Using Bluetooth to connect the devices makes Spy Bot extremely versatile. Set up the surveillance app anywhere – no wifi or carrier signal needed.

Upload & Share

What fun is secretly recording video if no one sees it? Upload captured videos and compete for dope prizes! Be sure to keep it classy, though.

Protect Yourself

If your hidden camera is about to be discovered, use the “Kill” button to exit the program on both devices to the main screen, protecting your identity.


250x500-iPhone5

How does Spy Bot work?

Simply put, Spy Bot works as a surveillance app for your iPhone, iPad and / or iPod Touch. You use devices you already own to create an instant bluetooth spy camera. One device acts as the camera, and the other receives the video / audio.

For instance, you could connect your iPhone to your friend’s iPad. Then set your iPhone down in an inconspicuous spot such as a desktop or somewhere it can blend in with the surroundings. From the next room, you could watch everything the iPhone’s camera sees from your friend’s iPad screen and control recording.

If someone notices the iPhone, press the kill button to exit the app. If they pick it up to investigate, all they will see is the home screen. You quickly enter saying, “I thought I left that in here! Thanks for finding it.”

325x200-iPhone-Streamer250x200-iPhone-Receiver


.Ace file virus: what is it and how to remove related ransomware

.Ace file virus: what is it and how to remove related ransomware

Learn what dangers can emanate from an .ace extension file attached to email and how to act in case a ransomware infection intrudes on a computer this way. Distributors of file-encrypting ransomware appear to be constantly searching for new methods to deposit their code onto Windows machines. There are multiple known attack vectors, including the […]

Cerber Ransomware 4.1.1: decrypt files and remove virus

Cerber Ransomware 4.1.1: decrypt files and remove virus

Cerber Ransomware 4.1.1, the newest version of one of today’s nastiest crypto infections, has minor changes under the hood but is still a strong adversary. A ransomware attack entails critical risks to one’s data and computer health. Personal files become off limits, hardware gets an additional processing burden, and random applications may end up unusable. […]

Cerber ransomware evolution

Cerber ransomware evolution

The abnormally rapid progress of the crypto ransomware industry over the past several years has induced a delineation between the author and the actual distributor of an infection. The underground affiliate model called RaaS (Ransomware as a Service) has made this extremely dangerous extortion contrivance readily available for dummies and high-profile threat actors alike. The […]

Thor virus: how to decrypt .thor files ramsomware

Thor virus: how to decrypt .thor files ramsomware

This guide provides the low-down on the newest Locky variant called Thor ransomware and advises on workarounds to decrypt files with the .thor extension. Yesterday’s edition of Locky ransomware that appended the .shit suffix to one’s files didn’t last. The unexpected news that hit the headlines literally hours later is that a new heir to […]

Virus .shit files: Shit ransomware (RSA-2048/AES-128 encrypted)

Virus .shit files: Shit ransomware (RSA-2048/AES-128 encrypted)

New version of the Locky ransomware encrypts files, appends them with the .shit extension, and creates _WHAT_is.html as well as _WHAT_is.bmp ransom notes. Locky is a generic name of a ransomware family that appeared in early 2016 and has grown into one of the top global security threats ever since. There is no room for […]

DXXD ransomware: how to decrypt .dxxd files virus

DXXD ransomware: how to decrypt .dxxd files virus

The ransomware to be dissected in this post encrypts its victims’ files using AES-256 algorithm and appends the dxxd string to the original file extensions. What is DXXD ransomware The DXXD crypto ransomware malady is notoriously intricate. Aside from the customary tactics leveraged by most online extortionists, the individuals running said campaign use more social […]

Decrypt .dot file virus: how to recover from .dot extension ransomware (upd. 2017)

Decrypt .dot file virus: how to recover from .dot extension ransomware (upd. 2017)

The post is based on a comprehensive research of the .dot file extension virus and provides viable methods to restore .dot entries encrypted by the ransomware. There are several unique properties that enable end users and researchers to identify a piece of ransomware they are confronted with. The ones that lay on the surface include […]

Cerber Decryptor: how to remove Readme.hta ransomware

Cerber Decryptor: how to remove Readme.hta ransomware

This tutorial covers all the changes that the Cerber ransomware underwent as a result of the latest update and provides applicable recovery methods. It looks like the Cerber ransomware has switched from using the .cerber3 extension to a random one. This is one of the several modifications made to this infection in the course of […]

Odin virus removal: how to decrypt .odin extension files

Odin virus removal: how to decrypt .odin extension files

The guide below provides a comprehensive analysis of the .odin ransomware virus and lists viable methods to restore files encrypted by this new Locky version. There is a new variant of the notoriously prolific ransomware called Locky in the wild. The latest spinoff appends the .odin extension to encrypted files instead of the previously used […]

JohnyCryptor ransomware: decrypt .johnycryptor@hackermail.com.xtbl virus files

JohnyCryptor ransomware: decrypt .johnycryptor@hackermail.com.xtbl virus files

Learn how to act in case of the JohnyCryptor ransomware attack and get around the cipher to restore .johnycryptor@hackermail.com.xtbl (.johnycryptor@aol.com.xtbl) files. The ransomware family known as Troldesh, or Shade, is amongst the most prolific ones to date in terms of the different spinoffs circulating on the open Internet. The sample that appends a victim’s files […]

Page 8 of 14« First...«678910»...Last »