Raising children in the social media limelight? Pause before you post – 10 minute mail

How (over)sharing your children’s triumphs and antics with the world may impact their immediate and distant future – and how to reduce the risks of ‘sharenting’

Most people like to share glimpses of their personal lives on social media, ranging from sports activities and delicious food to achievements and special moments. These are usually shared with their network of family, friends, and sometimes followers. The usual reason is strengthening bonds, since your family and friendship circle can be dispersed all around the globe.

Those who are also parents often post photos of their children from a very early age, sometimes even in the form of ultrasounds. Strictly speaking, their children have a digital presence before they’re even born. And the sharing doesn’t stop there: teething, first steps, potty training, and a wide assortment of other achievements that some parents like to share well into their children’s teenage years.

The phenomenon of (over)sharing content involving one’s kids on social media has even earned its own name – sharenting. It’s all right to feel the need to document your children growing up, but it’s not OK to share their every waking moment on social media for everyone to see. Here are some reasons why.

Ultimately, it’s not your information

Although most parents obviously have the best interests of their children at heart, they also tend to be the biggest violators of their children’s privacy. According to a recent report from the Children’s Commissioner of England, parents post an average 1,300 photos and videos of their children by the age of 13. While parents share various aspects of their children’s lives with the best intentions, they should thoroughly think about what impact the sharing of this information could have for their children in the future. As their progeny grow up, some of the photos and details they have shared may have far-reaching consequences, which they are unaware of at the moment.

For example, parents may share pictures of their kids sporting T-shirts showing support for a political party or cause, with which their children might not want to be affiliated or even agree with when they grow up. Furthermore, it could prove difficult for them to shed the reputation their parents may have unintentionally cultivated for them by inappropriate sharenting.

While sharing the images of children is at the discretion of the parents when they are too young to understand or care, there comes a point where you have to have a discussion on posting about them on social media. You should make a set of rules on what content is acceptable and respect their opinions on the matter, including in what actually gets posted.

If you think the idea is novel, you’d be mistaken. Gwyneth Paltrow was called out by her daughter Apple Martin for not asking for her consent when the actress shared a mom-daughter photo. “Mom we have discussed this. You may not post anything without my consent,” wrote Apple, who was 14 at the time.

What am I sharing? And with whom?

Data on the internet is, by design, usually searchable, shareable, and long-lasting. Or in other words “what goes on the internet, usually stays there”. An important tidbit of internet etiquette that is frequently repeated is that you should think twice about what you’re sharing, something that should apply tenfold if you’re sharing someone else’s information, like your child’s.

Nonetheless, people tend to forget that something as banal as sharing a public photo of a child’s birthday party could cause a lot of harm if the photo made its way into the wrong hands. Let’s break down how much information one such post can include. At the very least, it could include:

  • a photo of the child, probably with a wish along the lines of “Happy 2nd birthday, John!”,
  • details that may reveal the location, such as landmarks,
  • other people, since it may be a group photo; this may be problematic too, as you need to be mindful of other people’s privacy,
  • a geotag if the parent hasn’t turned off location tracking.

Piecing the information together, we have the child’s name, birth date, and address. This information could be then used, for example, for identity theft and fraud.

Stacey Steinberg, associate director for the Center on Children and Families, also touched upon the perils of sharenting in her paper, Sharenting: Children’s privacy in the age of social media. One of the examples mentioned is of a mother who posted pictures of her twins’ toilet training. She later found out that strangers accessed these pictures, downloaded and altered them, and then shared those on a website used by pedophiles.

RELATED READING: Online grooming: A threat to minors that demands our attention

This and other of Steinberg’s examples demonstrate that people are sometimes woefully unaware of how easy it is for other people to download and store images shared on social media, or of how much information they contain. Which brings us to another question – who are you sharing these photos with?

The audience of your posts depends on where and with whom you choose to share them. If your social media profile is public, then literally anyone who stumbles upon your profile can see the content. However, if you keep it private, only those you have “friended” or allowed to follow you can see it. How many of them do you really know? When was the last time you conducted an audit of your friend or follower list?

Facebook, for example, allows you to choose an audience for each of your posts, so you can restrict them to specific family members and selected friends. But that presents its own set of problems. Can you trust them not to repost it? Do you believe that they adhere to proper cybersecurity and privacy practices and have everything locked down tighter than Fort Knox? These are questions parents probably don’t really ask themselves all that often when posting something, although they should.

How to be a responsible “sharent”?

The best and safest advice is, “don’t post anything relating to your children on social media”, but most modern parents would be hard-pressed to comply. Flicking through physical photo albums is from a bygone era and hauling them around to share with family and friends is a tad impractical. However, there are ways to share photos that mitigate the risks we outlined earlier.

  • Don’t share anything that may contain any type of personal details or information that could help identify your child: full names, addresses, birth dates.
  • Turn off location tracking when taking photos so they don’t get geotagged.
  • Be specific about how you share the photos; take a look at your privacy filters first and the audience of the post before sharing on social media.
  • Share photos and information with people you really know and trust and ask them to not share them further.
  • Before posting anything, take a step back and consider how what you’re planning to share is going to reflect on your kid in the future.

Everybody understands the need of recording memories and sharing them with those close to you, but you need to do it in a safer and responsible way. Hopefully, this article shed some light on the risks associated with over sharenting and the impact it may have on your children’s future. Your kids will eventually join social media, so you can start by leading by example. That way, they’ll have a stable foundation before you start a conversation with your children about the perils of social media.

To learn more about more dangers faced by children online as well as about how not only technology can help, head over to Safer Kids Online.



Amer Owaida


Temp Mails (https://tempemail.co/) is a new free temporary email addresses service. This service provide you random 10 minutes emails addresses. It is also known by names like: temporary mail, disposable mail, throwaway email, one time mail, anonymous email address… All emails received by Tempmail servers are displayed automatically in your online browser inbox.

Google Photos Stops Backing Up Social Media Folders By Default

Google Photos has stopped backing up images and videos from folders created by social media and messaging apps like WhatsApp, Messages, and TikTok (via Android Police).

Previously, Google’s photo app would automatically upload all media saved to an iOS device, including any files saved in folders originating from social and messaging apps.

Google says it’s now turning off this aspect of its cloud photo backup service “to save internet resources” as people share more photos and videos amid the ongoing global health crisis.

Users can reverse this change and re-enable backup of photos and video from social media and messaging apps by following these instructions.

Other digital services including YouTube and Disney+ adopted similar measures to reduce bandwidth strain caused by the global health crisis several months ago.

Tag: Google Photos

This article, “Google Photos Stops Backing Up Social Media Folders By Default” first appeared on MacRumors.com

Discuss this article in our forums


Temp Mails (https://tempemail.co/) is a new free temporary email addresses service. This service provide you random 10 minutes emails addresses. It is also known by names like: temporary mail, disposable mail, throwaway email, one time mail, anonymous email address… All emails received by Tempmail servers are displayed automatically in your online browser inbox.

3 things to discuss with your kids before they join social media – 10 minute mail

What are some of the key things your children should know about before they make their first foray into social media?

Since technology has permeated every facet of life, social media has become a daily part of it. Adults are not the only ones flocking to social sites; an increasing number of children are too. Children actually do have their own social networks they can start their journey on; those are usually marketed as moderated safe havens, where children can interact, while parents have a degree of oversight of their activities. Even Facebook has introduced a kid’s version of its messenger app.

However, these are moderated, curated, and safe spaces that children eventually leave when they reach a certain age. So, what can you do, to make your children’s transition to more adult-centric social networks as safe and smooth as possible? As we mark the International Children’s Day and the Global Day of Parents, let’s take a look at some of the discussions you should have with your children prior to them joining Facebook, Instagram, TikTok or others social networking sites.

Are you sure you want to share that?

What goes on the internet stays on the internet; a mantra almost as old as the internet itself. Something most adults tend to forget, although it should be reiterated every time they consider sharing anything on the internet. The same mantra should be emphasized to children who are going to join social networks geared toward adults.

If they want to post or share something, they should always think about how it would reflect on them in the future. Although it may prove to be a difficult task to discuss such a topic with teenagers, it’s nevertheless important. A good rule of thumb before posting anything would be for them to ask themselves what an older relative (a grandparent for example) would say, if they saw the content.

RELATED READING: At what age should kids be able to access online services?

Perhaps another teaching moment could be to point out how a youthful indiscretion could come back to haunt them, or invalidate their career choices or even university applications in the future. Unfortunately, there are myriad examples of how tweets, forum posts and even yearbook photos and comments have come back to haunt entertainers, sports figures, and public officials alike.

Do you really know that person?

“Don’t talk to strangers” is perhaps one of the most repeated sentences a child hears growing up. The point is hammered home not just by parents, but teachers, public service announcements, kid’s shows, and the list goes on. So, while most teens may consider that social networks are safer since it’s online and “it doesn’t count”, parents should clearly communicate that the risks are the same and, in some cases, may even prove to be worse.

Unfortunately, you can illustrate the risks using countless examples of horror stories involving teenagers who were groomed online by child predators and eventually fell victim to them. Alternatively, there are multiple movies and TV series episodes dealing with the topic of interacting with strangers online, as one ancient proverb says: “it’s better to see something once than to hear about it a thousand times.” Black Mirror is one such show that deals with the dark side of technology and connected life, albeit in a more sci-fi mode.

Privacy settings

When adults sign up to a social network, they are rarely in a hurry to go through their privacy settings, so it can’t be expected of teenagers to be any more meticulous, even if they were born into a connected world. Another thing to keep in mind is that social networks continuously update their privacy and security settings to keep up with the increased scrutiny of the general public and governments alike. Therefore, instilling in teenagers a sense of responsibility about how their data is handled and viewed is very important.

To that end, some social networks started introducing tools that allow you to conduct reviews of your privacy. Facebook, for example, has the Privacy Checkup. This comprehensive tool allows you to look at your profile through the eyes of different types of viewers, ranging from friends to strangers, so you can more easily choose what you want to share and with whom. Another nifty option lets you audit who can see your past and future posts. You can read through our article on Facebook privacy settings to have a better grasp of what options you have to secure both your and your teen’s privacy.

Final thoughts

Raising a child in a more digitalized world can prove to be a challenge, especially since times have changed and a lot of the options and technologies weren’t around when you were growing up. On the other hand, it is important not to shy away from these challenges and to prepare your kids for the obstacles they will face in the digital world as well as in the real one, since they are deeply intertwined. By talking to your children about the risks and pitfalls of social media and how to handle them responsibly, you can prepare them better for adulthood and protect them – as well as rest easier – since they will be more vigilant online.

To learn more about more dangers faced by children online as well as about how not only technology can help, head over to Safer Kids Online.



Amer Owaida


Temp Mails (https://tempemail.co/) is a new free temporary email addresses service. This service provide you random 10 minutes emails addresses. It is also known by names like: temporary mail, disposable mail, throwaway email, one time mail, anonymous email address… All emails received by Tempmail servers are displayed automatically in your online browser inbox.

Apollo for Reddit 1.8 Improves Media Viewing, Sharing Options, and More

Former Apple intern Christian Selig has released version 1.8 of Apollo, the popular Reddit client developed with Apple’s iOS design guidelines in mind.

The latest update focuses on improving the viewing of media. For example GIFs can now be paused and videos play inline with the feed, so users no longer have to tap them in order to see what’s going on at a glance.

Users can also save and share GIFs, while sharing in general has been streamlined and improved within the app. For example, sharing the video file for Reddit videos now automatically merges the video and audio stream.

In addition, users can now share a comment or a post as an image by tapping Share as Image, which will stitch together as many screens as necessary. The option also supports sharing image posts, which is useful for posts that would benefit from having the title merged with the image for context.

Apollo’s latest update also adds iPadOS 13.4 cursor support, and plays nice with the new Reddit awards system and Reddit Polls.


Elsewhere, there are five new app icons to check out, bug fixes, improvements to viewing comments, and more.

Apollo is available for iPhone and iPad on the App Store [Direct Link] as a free download without ads, with optional in-app purchases available to unlock enhanced features such as multiple accounts, gestures, Touch ID or Face ID authentication, and GIF scrubbing.

Temp Mails (https://tempemail.co/) is a new free temporary email addresses service. This service provide you random 10 minutes emails addresses. It is also known by names like: temporary mail, disposable mail, throwaway email, one time mail, anonymous email address… All emails received by Tempmail servers are displayed automatically in your online browser inbox.

Lithuania accused the Russian media of misinformation – Disposable mail news

Lithuania has published an annual report submitted by the Ministry of Defense, in which it accused the Russian media of misinformation.

According to Lithuanian experts, the number of complex cyberattacks in the Baltic Republic has increased, which were more advanced both in terms of technological solutions and in terms of content.

According to them, some Russian publications form a negative image of Lithuania, and its image is not true.

The Ministry noted that the image of Lithuania as a hostile and unreliable state is being created. Russian Media uses content that incites war and national hatred, as well as falsified facts, video editing, and deliberately distorted statements.

According to the Ministry of Defense, the flow of such information increases during significant events in foreign policy and within the country in order to form a negative image of Lithuania in the West.

It should be noted that Russian journalists are regularly hindered from performing their professional duties in the Baltic States. Russian Foreign Ministry spokeswoman Maria Zakharova said that Russian media in the Baltic States are being persecuted for historical truth.

It is interesting to add that on April 16, Lithuanian Vice Minister of Defense Edwinas Kerza stated that the routers used in Lithuania to distribute wireless Internet are made not in China, but in Russia, and send user data to servers in the Russian Federation.

“They were common, and still widely distributed, because they are budget-class routers that are quite productive, that is, fast and inexpensive… And as we have established, although they were supposed to be produced in Taiwan, they are actually produced in Russia,” said Kerza.

It is reported that the model that attracted such close attention to the Lithuanian military has already been removed from the sale. The security services are concerned that, according to the Vice Minister, up to 90% of routers in the country are of Russian origin, and potentially spy on Lithuanian citizens.


Temp Mails (https://tempemail.co/) is a new free temporary email addresses service. This service provide you random 10 minutes emails addresses. It is also known by names like: temporary mail, disposable mail, throwaway email, one time mail, anonymous email address… All emails received by Tempmail servers are displayed automatically in your online browser inbox.

Virgin Media data leak exposes details of almost 1 million people – 10 minute mail

The misconfigured database was accessed by an unauthorized party on at least one occasion

Virgin Media has disclosed a data leak that exposed the personal information of around 900,000 people. The incident, which impacted around 15% of the British company’s fixed-line customer base, originated from a misconfigured database that was used for marketing purposes.

“The database did not include any passwords or financial details, such as credit card information or bank account numbers, but did contain limited contact information such as names, home and email addresses and phone numbers,” the company’s CEO Lutz Schüler said in a press statement.

Importantly, the telco company’s own investigation found that the database had been accessed by an unknown party at least once. The company is not sure about the extent of the access, nor if the information was misused in any way.

According to an email sent out to customers and quoted by The Register, the database was left unsecured from at least April 19th, 2019. Once the company became aware of the leak, it immediately shut down the database. It followed up by issuing an apology and by informing all affected customers about the type of information that was exposed.

The aftermath

Since the leaked information contained email addresses and other contact information, the company urges its customers to watch out for phishing campaigns.

If you receive an email from an unverified source, you should avoid clicking on it at all costs, as well as refrain from clicking on any suspicious links – this advice applies regardless of whether you’re the company’s customer or not. You can test yourself to see if you’d be able to spot a phishing scam.

In response to the leak, Virgin Media also launched a data-incident help page where it lists details regarding the incident and adds recommendations on what to do. The company also contacted the Information Commissioner’s Office, the UK’s regulatory body dealing with data protection, about the incident.

Data leaks originating from misconfigured databases and public-facing repositories are not a rare occurrence Recent leaks exposed plastic surgery photos of thousands of people and 250 million customer support records belonging to Microsoft.



Amer Owaida


Temp Mails (https://tempemail.co/) is a new free temporary email addresses service. This service provide you random 10 minutes emails addresses. It is also known by names like: temporary mail, disposable mail, throwaway email, one time mail, anonymous email address… All emails received by Tempmail servers are displayed automatically in your online browser inbox.

Russian Defence Minister says Pro-Western Activists Trying to Infiltrate Military Facilities using Media Laws as a cover – Disposable mail news

Defense Minister Sergei Shoigu, speaking in the Federation Council, announced opposition attempts to penetrate Russian military facilities.

The head of the military Department recalled that Western countries regularly make high-profile accusations against Moscow, such as interference in American elections, hacking attacks, and concealment of military losses.

“In our country, they are supported by a Pro-Western opposition division regularly trained abroad. Using media laws as a cover, its activists are trying to infiltrate military facilities and are monitoring relatives and witnesses. They go to hospitals where our wounded are lying, to cemeteries, to commemorations, to the families of our dead children. They take photos of the entrances and exits from our secret objects and put them on the Internet. You can imagine what responsibility they would be brought to in Western countries,” said the head of the military Department.

In this regard, Shoigu called on senators to regulate Russian legislation in this area.
The head of the defense department also told the Federation Council about the increase in the number of cyberattacks against the Russian army.

“The information space today has become another theater of war. Over the past three years, the information infrastructure of the Armed Forces has been attacked by more than 25 thousand high-tech computer attacks from abroad. At the same time, their number increases annually by an average of 12%. We are ready for this fight. Of course, I wanted the hackers to have a little less domestic helpers,” said Shoigu.

According to him, the Ministry of Defense has a reliable system for protecting information resources, and all attacks are neutralized.

A number of countries have previously accused Russia of hacking attacks. Thus, Georgia accused the Russian military of planning and conducting a cyberattack, as a result of which sites and servers of several government bodies, courts, the media, and private companies were damaged. Also, the head of the Ministry of Defense of Ukraine Andrei Zagorodniuk said that the country is daily faced with cyberattacks that come from Russia.

At the same time, since 2016, the United States has been discussing the topic of possible Russian interference in the presidential election, as a result of which Donald Trump became the head of state.


Temp Mails (https://tempemail.co/) is a new free temporary email addresses service. This service provide you random 10 minutes emails addresses. It is also known by names like: temporary mail, disposable mail, throwaway email, one time mail, anonymous email address… All emails received by Tempmail servers are displayed automatically in your online browser inbox.

Beware of Stalkerware That Has Eyes On All of Your Social Media! – Disposable mail news

Dear social media mongers, amidst all the talk about the Coronavirus and keeping your body’s health in check, your digital safety needs kicking up a notch too.

Because, pretty recently, security researchers discovered, what is being called as a “Stalkerware”, which stalks your activities over various social platforms like WhatsApp, Instagram, Gmail, Facebook, and others.

‘MonitorMinor’, per the sources, is definitely the most formidable one in its line.

Stalkerware are “monitoring software” or ‘Spyware’ that are employed either by people with serious trust issues or officials who need to spy for legitimate reasons.

Via this extremely creepy spyware kind, gathering information like the target’s ‘Geographical location’ and Messaging and call data is a cakewalk. Geo-fencing is another spent feature of it.

This particular stalkerware is hitting the headlines this hard because, MonitorMinor has the competence to spy on ‘Communication channels’, like most of our beloved messaging applications.

The discoverers of this stalkerware issued a report in which they mentioned that in a “clean” Android system, direct communication between applications is blocked by the “Sandbox” to kill the possibilities of the likes of this spyware gaining access to any social media platform’s data. This is because of the model called “Discretionary Access Control” (DAC).

Per sources, the author of the stalkerware in question manipulates the “SuperUser-type app” (SU utility) (if present) allowing them root-access to the system.

The presence of the SU utility makes all the difference for the worse. Because owing to it and its manipulation, MonitorMinor gains root access to the system.

The applications on the radar are BOTIM, Facebook, Gmail, Hangouts, Hike News & Content, Instagram, JusTalk, Kik, LINE, Skype, Snapchat, Viber, and Zalo-Video Call.

From lock patterns to passwords, MonitorMinor has the power to dig out files that exist in the system as ‘data’. And it obviously can use them to unlock devices. This happens to be the first stalkerware to be able to do so, mention sources.

Per reports, the procedure is such that the “persistence mechanism” as a result of the malware manipulates the root access. The stalkerware then reverts the system section to read/write from the initial read-only mode, copies itself on it, deletes itself from the user section, and conveniently goes back to read-only mode again.

Reports mention that even without the root access, MonitorMinor can do a consequential amount of harm to targets. It can control events in apps by manipulating the “Accessibility Services”. A “keylogger” is also effected via the API to permit forwarding of contents.
Unfortunately, victims can’t do much to eradicate the stalkerware form their systems, yet.

Other functions of the stalkerware include:
• Access to real-time videos from the device’s camera
• Access to the system log, contact lists, internal storage contents, browsing history of on Chrome, usage stats of particular apps
• Access to sound recordings from the device’s microphone
• Control over the device’s SMS commands.

The security researchers released a report by the contents of which, it was clear that the installation rate of it was the maximum in India, closely followed by Mexico and then Germany, Saudi Arabia, and the UK.

The researchers also per reports have reasons to believe that possibly the MonitorMinor might have been developed by an Indian because they allegedly found a ‘Gmail account with an Indian name’ in the body of MonitorMinor.


Temp Mails (https://tempemail.co/) is a new free temporary email addresses service. This service provide you random 10 minutes emails addresses. It is also known by names like: temporary mail, disposable mail, throwaway email, one time mail, anonymous email address… All emails received by Tempmail servers are displayed automatically in your online browser inbox.

How To Add Subtitles In VLC Media Player For Movies/Videos (2 Methods) – 10 minute mail

In Short Hacks: While watching a movie or a video on the VLC media player, you might encounter some trouble understanding some of the dialogues may be due to its different accent or external noise disturbance, etc.  Whatever the case maybe, the only solution to such a problem is the subtitles. In this tutorial, you will learn How To Add Subtitles on VLC Media Player. So go through the article to know more about it.

How To Add Subtitles In VLC Media Player For Movies/Videos
How To Add Subtitles In VLC Media Player For Movies/Videos

If you have subtitles on whichever movie or video you are watching, you can easily make out what is being said in that particular movie or video. But, the only problem to have these subtitles added to any video or movie in the VLC media player is the method which one needs to follow to get these subtitles.

Most of the people are not familiar with the techniques required to do so. Hence, here we are going to discuss with you the proper methods along with their steps which will assist you in adding subtitles in VLC media player. In our previous article, we have listed the methods which you can use to create your own subtitles hence, if you are hoping to add subtitles to your self-made videos, you won’t find the subtitles anywhere but, you will have to create your own.

Also Read:  How To Download Using Torrent – Movies & Any Files

How To Add Subtitles On VLC Media Player For Movies/Videos

The 2 methods are quite easy to understand as well as execute. So let’s take a look at these methods and the steps listed below.

Method #1: Download The Subtitles

Add Subtitles On VLC Media Player
Add Subtitles On VLC Media Player

In this method, you just need to click on some options and you need to download the subtitles if you don’t have them.

Step 1: Play the video or movie you want to watch on the VLC media player.

Step 2: Then from the menu bar click on the option which reads ‘Video‘.

Step 3: A dropbox will now be visible on your screen with many more options. Here, select the option which reads as ‘subtitles track‘ and then click on the ‘Open file‘ option.

Step 4: Now, a dialogue will appear from which you still have to select the subtitle file for that movie or video which you had downloaded.

Step 5: After you have selected the appropriate file, click on the ‘Open‘ option which you will find at the bottom of the dialogue box.

That’s it! The subtitles for the video or movie you are watching will be added to the VLC media player if you have downloaded the proper subtitle.

Also Read: Top 12 Best Hacking Movies Must Watch

Method #2: Using VLSub Subtitles

Add Subtitles On VLC Media Player
Add Subtitles On VLC Media Player

In the method, we are going to use a very useful, highly rated VLC add-on known as VLSub to download and apply the required subtitles. When this plugin is downloaded and installed, it automatically searches for the subtitles for the current movie or video you are watching and shows the best results fur you to choose from. However, this plugin works only with the VLC 2.2 version so, if your VLC player is not updated then, please do it before you proceed any further. The steps required in this process are listed below.

Step 1: Install the VLCub plugin from here.

Step 2: A new menu will be added which is ‘View > VLSub‘. Click on this newly added option and specify your search criteria which is either by hash or by name. Once you select an option, the search results will be displayed.

Step 3: Select the most appropriate search for the movie or video which you are watching.
Now, when you play the video, you will notice that the subtitles are successfully added in the VLC media player.

Also Read: Top 16+ Best Download Managers for Android 

Wrap Up: These were two of the many methods which you can use to add subtitles to the video or movie which you are watching the VLC media player. We are pretty sure that, either of these methods will surely be of some help to you in adding subtitles. If you get sick at some step or if you have any better method which one can use then, obese let us know about it in the comments.

Temp Mails (https://tempemail.co/) is a new free temporary email addresses service. This service provide you random 10 minutes emails addresses. It is also known by names like: temporary mail, disposable mail, throwaway email, one time mail, anonymous email address… All emails received by Tempmail servers are displayed automatically in your online browser inbox.

Virgin Media data leak exposes details of almost 1 million people – 10 minute mail

The misconfigured database was accessed by an unauthorized party on at least one occasion

Virgin Media has disclosed a data leak that exposed the personal information of around 900,000 people. The incident, which impacted around 15% of the British company’s fixed-line customer base, originated from a misconfigured database that was used for marketing purposes.

“The database did not include any passwords or financial details, such as credit card information or bank account numbers, but did contain limited contact information such as names, home and email addresses and phone numbers,” the company’s CEO Lutz Schüler said in a press statement.

Importantly, the telco company’s own investigation found that the database had been accessed by an unknown party at least once. The company is not sure about the extent of the access, nor if the information was misused in any way.

According to an email sent out to customers and quoted by The Register, the database was left unsecured from at least April 19th, 2019. Once the company became aware of the leak, it immediately shut down the database. It followed up by issuing an apology and by informing all affected customers about the type of information that was exposed.

The aftermath

Since the leaked information contained email addresses and other contact information, the company urges its customers to watch out for phishing campaigns.

If you receive an email from an unverified source, you should avoid clicking on it at all costs, as well as refrain from clicking on any suspicious links – this advice applies regardless of whether you’re the company’s customer or not. You can test yourself to see if you’d be able to spot a phishing scam.

In response to the leak, Virgin Media also launched a data-incident help page where it lists details regarding the incident and adds recommendations on what to do. The company also contacted the Information Commissioner’s Office, the UK’s regulatory body dealing with data protection, about the incident.

Data leaks originating from misconfigured databases and public-facing repositories are not a rare occurrence Recent leaks exposed plastic surgery photos of thousands of people and 250 million customer support records belonging to Microsoft.



Amer Owaida


Temp Mails (https://tempemail.co/) is a new free temporary email addresses service. This service provide you random 10 minutes emails addresses. It is also known by names like: temporary mail, disposable mail, throwaway email, one time mail, anonymous email address… All emails received by Tempmail servers are displayed automatically in your online browser inbox.