Go from iPhone to Spy Phone!

Spy Bot is the surveillance app that turns your iPad, iPhone and iPod Touch into an instant spy phone / bluetooth spy camera! Use your iPhone, iPad or iPod Touch’s camera to stream live video and audio to connected devices up to 50 feet away! Perfect for situations where you can’t be in the room, but need to know what’s going on.

Download Spy Bot
Available @ the App Store

Spy Bot, the only Bluetooth Surveillance App for iOS


Stream Video

Spy Bot links two i-devices together to create an instant surveillance camera setup. Set up in an inconspicuous spot and watch from up to 50 feet away.

Record Discreetly

You can discreetly control recording and streaming from up to 50 ft away. Recorded videos save to the streaming devices ‘My Videos’ tab.

Bluetooth

Using Bluetooth to connect the devices makes Spy Bot extremely versatile. Set up the surveillance app anywhere – no wifi or carrier signal needed.

Upload & Share

What fun is secretly recording video if no one sees it? Upload captured videos and compete for dope prizes! Be sure to keep it classy, though.

Protect Yourself

If your hidden camera is about to be discovered, use the “Kill” button to exit the program on both devices to the main screen, protecting your identity.


250x500-iPhone5

How does Spy Bot work?

Simply put, Spy Bot works as a surveillance app for your iPhone, iPad and / or iPod Touch. You use devices you already own to create an instant bluetooth spy camera. One device acts as the camera, and the other receives the video / audio.

For instance, you could connect your iPhone to your friend’s iPad. Then set your iPhone down in an inconspicuous spot such as a desktop or somewhere it can blend in with the surroundings. From the next room, you could watch everything the iPhone’s camera sees from your friend’s iPad screen and control recording.

If someone notices the iPhone, press the kill button to exit the app. If they pick it up to investigate, all they will see is the home screen. You quickly enter saying, “I thought I left that in here! Thanks for finding it.”

325x200-iPhone-Streamer250x200-iPhone-Receiver


Bad Rabbit ransomware removal and data recovery

Bad Rabbit ransomware removal and data recovery

Beware of the destructive ransomware strain called Bad Rabbit, which cripples an infected host’s MBR, encrypts files and demands a ransom in Bitcoin. Ransomware isn’t a homogeneous concept. It can denote perpetrating code that encrypts individual files and holds them for ransom – in fact, that’s how mainstream ransom Trojans operate. There are blackmail viruses […]

Decrypt .GDCB files – remove GandCrab ransomware virus

Decrypt .GDCB files – remove GandCrab ransomware virus

Find out how the new GandCrab ransomware is different than the mainstream crypto threats and what methods might help restore encrypted .GDCB files. Not only does the GandCrab ransomware stand out from the rest due to its bizarre name, but it also turns out to represent a new generation of blackmail viruses. It is competently […]

Decrypt and remove .Rapid ransomware virus

Decrypt and remove .Rapid ransomware virus

Get exhaustive details regarding the new Rapid ransomware that targets both PCs and servers and appends the .rapid or .paymeme extension to encrypted files. The economy behind file-encrypting ransomware has been suffering a decline lately, so the emergence of any brand new strain happens to be quite an event. With that said, the fresh crypto […]

Yoshikada Decryptor: remove and decrypt ransomware virus

Yoshikada Decryptor: remove and decrypt ransomware virus

Learn what kind of damage the Yoshikada Decryptor ransomware does to an infected computer and how to recover .crypted_yoshikada@cock.lu files held for ransom. There has been quite a bit of reporting and expert discussion lately about a new blackmail virus calling itself the Yoshikada Decryptor. The outbreak of this infection took root in early January […]

Remove and decrypt .sexy files ransomware

Remove and decrypt .sexy files ransomware

This article provides in-depth details on the latest variant of the GlobeImposter ransomware that concatenates the .sexy extension to encrypted files. GlobeImposter is one of the very few blackmail viruses that outperform their prototype in every way imaginable. The codename gives a clue that its modus operandi and code were scraped off of the Globe […]

Remove Java ransomware and decrypt .java virus files

Remove Java ransomware and decrypt .java virus files

Stay on top of the security issue where the latest variant of the CrySiS, or Dharma, ransomware encrypts one’s files and appends them with the .java extension. Upd. Jan. 2018: decrypthelp@qq.com version There aren’t many crypto ransomware strains that remain consistently active for more than a month. The CrySiS lineage of blackmail viruses, though, is […]

Chromesearch.win virus removal from Chrome, Firefox, IE and Safari

Chromesearch.win virus removal from Chrome, Firefox, IE and Safari

This article highlights the chromesearch.win hijacker issue and provides an effective method to stop the annoying redirects in targeted web browsers. Computer infections zeroing in on web browsers aren’t nearly as severe as phenomena like ransomware or banking Trojans. However, they are a heck of a nuisance. They are also amongst cybercriminals’ favorites, because they […]

How can you recognize that the email attachment received is not safe?

How can you recognize that the email attachment received is not safe?

This article covers the hallmarks of potentially dangerous email attachments that, when opened, may infect your computer with malicious code like Arena ransomware. The cybercriminal ecosystem is getting increasingly sophisticated over time, but there are timeless, old school contamination techniques that don’t change and work just as effectively as they did years ago. Malspam (malicious […]

File Spider ransomware removal: decrypt .spider virus files

File Spider ransomware removal: decrypt .spider virus files

As a new blackmail virus called File Spider is wreaking havoc mostly in Europe, this guide will come in handy for victims in terms of decrypting .spider files. Ransomware developers appear to be switching to the animal world for naming their despicable products. The File Spider virus is one of these zoo-borne culprits. Given the […]

Remove Cryptonight virus (JS:Cryptonight trojan) from Windows

Remove Cryptonight virus (JS:Cryptonight trojan) from Windows

Learn how to get rid of the annoying cryptocurrency miner called Cryptonight that covertly uses one’s computing power without asking for user authorization. It’s obvious that cryptocurrency is the next big thing, making up a whole new economy that’s growing at an extremely rapid rate. This powerful unregulated market couldn’t possibly keep cybercriminals on the […]

Page 2 of 20«12345»1020...Last »