Protect your devices from theft.

Prey lets you keep track of your laptop, phone and tablet whenever missing, whether you're in town or abroad. Open source, proven software with hundreds of documented recoveries all around the world.

How it works

Prey Overview

Silent but deadly

Basically you install a tiny agent in your PC or phone, which silently waits for a remote signal to wake up and work its magic.

This signal is sent either from the Internet or through an SMS message, and allows you to gather information regarding the device's location, hardware and network status, and optionally trigger specific actions on it. Next

Prey Reports

Recover what is rightfully yours

You can quickly find out where your computer is located, who's using it, and what they're doing on it thanks to Prey's powerful reports system.

By marking your device as missing, Prey will gather all the evidence you request and send it either to your Control Panel account or directly to your mailbox, depending on the reporting method you choose. Next

Prey Actions

With the push of a button

Besides gathering information, you can also trigger actions remotely such as sounding a loud alarm or showing a message which will appear onscreen – just in case you want the guy to know he's being chased at.

You can also wipe your stored passwords for security, or even lock down your PC to prevent access. In other words, you're in control. Next

Protect your investment

Protect what you paid for

Not only do we depend on our mobiles and laptops on a daily basis: they also cost money. If getting robbed is painful, paying twice for something you already bought is even worse.

One place to track them all

One place to find them all

Prey works on all major operating systems, so it lets you keep track and trigger actions on all your devices from a single place. Like a universal remote control, but for gadgets.

Say no to unauthorized access

Prevent unauthorized access

When your data is at stake, bad things can happen. Use Prey to fully lock down your devices and delete your stored passwords, to ensure that no one will have access to your private stuff.

Privacy is paramount

Because privacy comes first

Sensitive data is gathered only when you request it, and is for your eyes only -- nothing is sent without your permission. You can always check our source code if you want to make sure.

Prey media coverage Prey media coverage