Go from iPhone to Spy Phone!

Spy Bot is the surveillance app that turns your iPad, iPhone and iPod Touch into an instant spy phone / bluetooth spy camera! Use your iPhone, iPad or iPod Touch’s camera to stream live video and audio to connected devices up to 50 feet away! Perfect for situations where you can’t be in the room, but need to know what’s going on.

Download Spy Bot
Available @ the App Store

Spy Bot, the only Bluetooth Surveillance App for iOS


Stream Video

Spy Bot links two i-devices together to create an instant surveillance camera setup. Set up in an inconspicuous spot and watch from up to 50 feet away.

Record Discreetly

You can discreetly control recording and streaming from up to 50 ft away. Recorded videos save to the streaming devices ‘My Videos’ tab.

Bluetooth

Using Bluetooth to connect the devices makes Spy Bot extremely versatile. Set up the surveillance app anywhere – no wifi or carrier signal needed.

Upload & Share

What fun is secretly recording video if no one sees it? Upload captured videos and compete for dope prizes! Be sure to keep it classy, though.

Protect Yourself

If your hidden camera is about to be discovered, use the “Kill” button to exit the program on both devices to the main screen, protecting your identity.


250x500-iPhone5

How does Spy Bot work?

Simply put, Spy Bot works as a surveillance app for your iPhone, iPad and / or iPod Touch. You use devices you already own to create an instant bluetooth spy camera. One device acts as the camera, and the other receives the video / audio.

For instance, you could connect your iPhone to your friend’s iPad. Then set your iPhone down in an inconspicuous spot such as a desktop or somewhere it can blend in with the surroundings. From the next room, you could watch everything the iPhone’s camera sees from your friend’s iPad screen and control recording.

If someone notices the iPhone, press the kill button to exit the app. If they pick it up to investigate, all they will see is the home screen. You quickly enter saying, “I thought I left that in here! Thanks for finding it.”

325x200-iPhone-Streamer250x200-iPhone-Receiver


CTB Locker virus decryption and removal tool

CTB Locker virus decryption and removal tool

Although files ciphered by the CTB Locker ransomware are impossible to decrypt without a private key kept by criminals, there still are some recovery chances. CTB Locker was once a highly prolific crypto malware breed but has evolved into more of a targeted threat featuring out-of-the-ordinary sophistication over time. Its immutable trait is a strong […]

Decrypt and remove .crypted file extension virus

Decrypt and remove .crypted file extension virus

Learn an efficient way to deal with a new ransomware family that adds a .crypted extension to users’ files and makes the data inaccessible. Antimalware labs are reporting an outbreak of ransomware attacks that result in disabling user access to their personal files while concurrently adding a “.crypted” suffix at the end of each. This […]

Cryptolocker removal tool and file decryption

Cryptolocker removal tool and file decryption

The article covers must-know facts about Cryptolocker, an advanced persistent Trojan that applies uncrackable RSA cipher to encode victims’ data. It has been around three years since the first fully functional instances of encryption-based ransomware emerged. The threat landscape has changed considerably over this period, but some infections from this cluster stay and still thrive. […]

Cerber ransomware: DECRYPT MY FILES virus removal

Cerber ransomware: DECRYPT MY FILES virus removal

Files that became encrypted and appended with .cerber extension indicate an aggressive ransomware attack that requires an urgent fix on the user’s end. The term “Cerber”, which is somewhat reminiscent of a scary mythical creature’s name, denotes a piece of ransomware that may cause infected people just about as much terror. The main concern for […]

RSA-2048/AES-128 virus: “All of your files are encrypted with RSA-2048 and AES-128 ciphers”

RSA-2048/AES-128 virus: “All of your files are encrypted with RSA-2048 and AES-128 ciphers”

Authors of the Locky ransomware have been using two different cryptographic algorithms to their own advantage, the campaign details being highlighted herein. Anatomy of the new file-encoding infection called Locky features an advanced take on malicious encryption activity. Its developer chose to blend a public-key cryptographic standard and a completely different symmetric algo in a […]

Hidden Tear: Is open-source ransomware really a good idea?

Hidden Tear: Is open-source ransomware really a good idea?

Over the past couple of years, security experts have gotten accustomed to dealing with ransomware breeds that pursue solely malicious goals. These are intrinsically profit-oriented pieces of code that circulate covertly, encrypt their victims’ files and demand a fee to make the badly mutilated data accessible again. Utku Sen, a researcher and security enthusiast from […]

Remove newsearch123 virus from Chrome, Firefox and IE

Remove newsearch123 virus from Chrome, Firefox and IE

Newsearch123 browser extension gets fairly high privileges on a computer without the user’s actually granting them, which is a clear signal of viral activity. When confronted with enticing free software downloads on the Internet, PC users should always be on the lookout for a catch that may lurk underneath the setup wizard screens. This is […]

How to decrypt .locked files and remove Locked ransomware virus

How to decrypt .locked files and remove Locked ransomware virus

The entry contains comprehensive instructions on ways to handle the .locked file ransomware, including data restoration workarounds and virus removal proper. It’s hard to think of a worse predicament for computer users than a ransom trojan attack. The sucker punch inflicted by these threats pursues the goal of making the victims redeem their personal information […]

RSA-4096 ransomware virus removal and decrypter

RSA-4096 ransomware virus removal and decrypter

“All of your files were protected by a strong encryption with RSA-4096”. RSA-4096 denotes a standard of asymmetric encryption where both components of the public-private key pair are 4096 bits long. Such a high degree of entropy means that the objective of data decoding is hardly feasible unless the aforementioned private key is readily available. […]

Decrypt .locky files and remove _Locky_recover_instructions virus

Decrypt .locky files and remove _Locky_recover_instructions virus

The .locky ransom virus is a new breed that poses elevated risk due to sizeable stealth, large attack surface and sophisticated money extortion tactic. The latest extortion contrivance called the Locky ransomware demonstrates that cybercriminals are obviously in pursuit of new operational mechanisms. Said infection is out-of-the-ordinary because its spreading mode differs from the analogs, […]

Page 9 of 11« First...«7891011»