Welivesecurity.com - SEO Checker

Overview of the SEO Check
Meta information
77% 
Page quality
83% 
Page structure
79% 
Link structure
41% 
Server
100% 
External factors
100% 
SEO Score
Response time
0.16 s
File size
84.60 kB
Words
814
Media files
22
Number of links
76 internal / 10 external

Task list of SEO Improvements

Meta specifications

Title
(Critically important)
Award-winning news, views, and insight from the ESET security community
The page title should be shorter than 580 pixels. It is 672 pixels long. Optimize title
There are no duplicate words in the title
Meta description
(Critically important)
WeLiveSecurity comes from the brains at ESET - experienced researchers with in-depth knowledge of the latest threats and security trends.
The length of the meta description is perfect. (859 pixels out of 1000 max pixel length)
Crawlability
(Critically important)
There are no problems in accessing the website.
Canonical URL
(Important)
https://www.welivesecurity.com/en/
There is a valid canonical link specified.
Language
(Somewhat important)
Language detected in text: en
Language defined in HTML: en
Server location: Slovakia
The following language is defined by HTML: en
Alternate/Hreflang Links
(Somewhat important)
There are no alternate links specified on this page.
Other meta tags
(Somewhat important)
There is no rel next meta tag on this page.
There is no rel prev meta tag on this page.
Domain
(Somewhat important)
The domain is no subdomain.
The domain length is good.
The domain does not contain non-latin characters.
Page URL
(Somewhat important)
No parameters were found in the URL.
No session ID was found in the URL.
The URL does not have too many subdirectories.
Charset encoding
(Somewhat important)
The charset encoding (UTF-8) is set correctly.
Doctype
(Nice to have)
The doctype HTML 5 is set correctly.
The doctype is placed at first in the HTML code.
Favicon
(Nice to have)
No favicon is linked in the HTML code.

Meta tags

NameValue
viewportwidth=device-width, initial-scale=1
robotsindex, follow, max-image-preview:large, max-video-preview:-1
descriptionWeLiveSecurity comes from the brains at ESET - experienced researchers with in-depth knowledge of the latest threats and security trends.
langen
twitter:titleAward-winning news, views, and insight from the ESET security community
og:typearticle
og:titleAward-winning news, views, and insight from the ESET security community
og:descriptionWeLiveSecurity comes from the brains at ESET - experienced researchers with in-depth knowledge of the latest threats and security trends.
charsetutf-8

Automatically check welivesecurity.com including all subpages at once!

Try for free
Guaranteed free of charge during trial period.

Page quality

Content
(Critically important)
The average number of words per sentence of 25.6 words is high.
This page contains 814 words. That's ok.
32.1% of the text are stop words.
Keywords used in the page title are also used in the page content. That's good!
The page contains a listing, which indicates a good text layout.
11 paragraphs were found on this page.
The text content is perfect.
No placeholders texts or images were found.
There are no duplicates on the site.
Frames
(Critically important)
This page does not use a frameset.
Mobile optimization
(Somewhat important)
No Apple touch icon is specified.
A viewport "width=device-width, initial-scale=1" is provided.
Bold and strong tags
(Somewhat important)
The amount of tags is very high (18). We recommend using a maximum of 16 tags for this page.
The following tag is repeated too often: facundo muñoz
Image SEO
(Somewhat important)
Alt text (alternative text) is correctly used on all found images.
Social Networks
(Nice to have)
There are only a few social sharing widgets on the page. Make your website popular in social networks with social sharing widgets.
Additional markup
(Nice to have)
No additional page markup was found.
HTTPS
(Somewhat important)
This website uses HTTPS to protect privacy and integrity of the exchanged data.
All included files are also transferred via HTTPS.

Media list

URLAlt attributeTitle
...zards-slac-spoofing-adversary-middle.pngTheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
...m/tn/-x82/wls/2021/02/facundo-munoz.jpegFacundo Muñoz
...ransomhub/ransomhub-edr-killshifter.jpegShifting the sands of RansomHub’s EDRKillShifter
/build/assets/users-588e179f.pngJakub Souček
...sparrowdoor-backdoor-threat-research.pngYou will always remember this as the day you finally caught FamousSparrow
.../-x82/wls/2022/03/alexandre-cote-cyr.jpgAlexandre Côté Cyr
...25/03-25/cyber-resilience-ransomware.pngResilience in the face of ransomware: A key to business survival
...ecurity-awareness-training-employees.pngMaking it stick: How to get the most out of cybersecurity training
.../05-25/missed-jury-duty-phone-scams.jpegBeware of phone scams demanding money for ‘missed jury duty’
...wls/2025/05-25/toll-road-unpaid-scam.pngToll road scams are in overdrive: Here’s how to protect yourself
...2/wls/2025/05-25/rsac2025-highlights.pngRSAC 2025 wrap-up – Week in security with Tony Anscombe
...zards-slac-spoofing-adversary-middle.pngTheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
...nth-cybersecurity-roundup-april-2025.pngThis month in security with Tony Anscombe – April 2025 edition
...2/wls/2025/04-25/ios-iphone-security.pngHow safe and secure is your iPhone really?
...04-25/deepfake-doctors-scams-tiktok.jpegDeepfake 'doctors' take to TikTok to peddle bogus cures
...2/wls/2025/04-25/google-forms-scams.jpegHow fraudsters abuse Google Forms to spread scams
...rtificial-intelligence-cyberattacks.jpegWill super-smart AI be attacking us anytime soon?
.../2025/04-25/capcut-fake-apps-dangers.pngCapCut copycats are on the prowl
...5/cybersecurity-infostealers-malware.pngThey’re coming for your data: What are infostealers and how do I stay safe?
.../04-25/education-sector-cyberattacks.pngAttacks on the education sector are surging: How can cyber-defenders respond?
...ity-report-q2-2024-q3-2024-d75a59c4.webpApt Activity Report
...managed-detection-response-c7e1a71f.webpMDR Protection

Page structure

H1 heading
(Critically important)
There is no H1 heading specified.
Headings
(Important)
The structure of headings is missing one or more levels. Do not skip heading levels.

Heading structure

Heading levelContent
H2 Let us keep you up to date
H3 Latest Articles
H3 Follow us
Some internal link anchor texts are too long.
Some internal links have dynamic parameters. All internal URLs, which are not marked as nofollow, should not contain dynamic parameters.
Some anchor texts are used more than once.
The number of internal links is ok.
There are 10 external links on this page.
LinkAttributesAnchor text
/en/A-TITLE WeLiveSecurity
/es/Español
A-TITLE Español
/de/Deutsch
A-TITLE Deutsch
/pt/Português
A-TITLE Português
/fr/Français
A-TITLE Français
/en/Text duplicate A-TITLE WeLiveSecurity
/en/tips-advice/TIPS & ADVICE
A-TITLE TIPS & ADVICE
/en/business-security/BUSINESS SECURITY
A-TITLE BUSINESS SECURITY
/en/about-eset-research/About ESET Research
A-TITLE About ESET Research
/en/eset-research/Blogposts
A-TITLE Blogposts
/en/podcasts/Podcasts
A-TITLE Podcasts
/en/white-papers/White papers
A-TITLE White papers
/en/threat-reports/Threat reports
A-TITLE Threat reports
/en/we-live-science/WeLiveScience
A-TITLE WeLiveScience
/en/ukraine-crisis-digital-sec...Ukraine crisis – Digital security resource center
A-TITLE Ukraine crisis – Digital security resource center
/en/we-live-progress/WeLiveProgress
A-TITLE WeLiveProgress
/en/covid-19/COVID-19
A-TITLE COVID-19
/en/resources/Resources
A-TITLE Resources
/en/videos/Videos
A-TITLE Videos
/en/cybersecurity/Digital Security
A-TITLE Digital Security
/en/scams/Scams
A-TITLE Scams
/en/how-to/How to
A-TITLE How to
/en/privacy/Privacy
A-TITLE Privacy
/en/cybercrime/Cybercrime
A-TITLE Cybercrime
/en/kids-online/Kids online
A-TITLE Kids online
/en/social-media/Social media
A-TITLE Social media
/en/internet-of-things/Internet of Things
A-TITLE Internet of Things
/en/malware/Malware
A-TITLE Malware
/en/ransomware/Ransomware
A-TITLE Ransomware
/en/secure-coding/Secure coding
A-TITLE Secure coding
/en/mobile-security/Mobile security
A-TITLE Mobile security
/en/critical-infrastructure/Critical infrastructure
A-TITLE Critical infrastructure
/en/about-eset-research/Threat research
A-TITLE Threat research
/en/company/about-us/About WeLiveSecurity
A-TITLE About WeLiveSecurity
/en/our-experts/Our Experts
A-TITLE Our Experts
/en/company/contact-us/Contact Us
A-TITLE Contact Us
/en/English
A-TITLE English
/es/Text duplicate Español
A-TITLE Español
/de/Text duplicate Deutsch
A-TITLE Deutsch
/pt/Text duplicate Português
A-TITLE Português
/fr/Text duplicate Français
A-TITLE Français
/en/eset-research/thewizards-a...Facundo Muñoz • 30 Apr 2025 • 11 min. read ESET Research TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks Facundo Muñoz • ...
IMG-ALT TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
A-TITLE TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
/en/eset-research/shifting-san...Jakub Souček and Jan Holman • 26 Mar 2025 • 22 min. read ESET Research Shifting the sands of RansomHub’s EDRKillShifter Jakub Souček and Jan Holman • 26 Mar ...
IMG-ALT Shifting the sands of RansomHub’s EDRKillShifter
A-TITLE Shifting the sands of RansomHub’s EDRKillShifter
/en/eset-research/you-will-alw...Alexandre Côté Cyr • 26 Mar 2025 • 24 min. read ESET Research You will always remember this as the day you finally caught FamousSparrow Alexandre Côté Cyr • ...
IMG-ALT You will always remember this as the day you finally caught FamousSparrow
A-TITLE You will always remember this as the day you finally caught FamousSparrow
/en/business-security/resilien...Business Security Ransomware Resilience in the face of ransomware: A key to business survival
IMG-ALT Resilience in the face of ransomware: A key to business survival
A-TITLE Resilience in the face of ransomware: A key to business survival
/en/business-security/making-i...Business Security Making it stick: How to get the most out of cybersecurity training
IMG-ALT Making it stick: How to get the most out of cybersecurity training
A-TITLE Making it stick: How to get the most out of cybersecurity training
/en/scams/phone-scams-demandin...Scams Beware of phone scams demanding money for ‘missed jury duty’ Scams Beware of phone scams demanding money for ‘missed jury duty’ When we get the call, i...
IMG-ALT Beware of phone scams demanding money for ‘missed jury duty’
A-TITLE Beware of phone scams demanding money for ‘missed jury duty’
/en/scams/put-brakes-toll-road...Scams Toll road scams are in overdrive: Here’s how to protect yourself Scams Toll road scams are in overdrive: Here’s how to protect yourself Have you receiv...
IMG-ALT Toll road scams are in overdrive: Here’s how to protect yourself
A-TITLE Toll road scams are in overdrive: Here’s how to protect yourself
/en/videos/rsac-2025-wrap-up-w...Video RSAC 2025 wrap-up – Week in security with Tony Anscombe Video RSAC 2025 wrap-up – Week in security with Tony Anscombe From the power of collaborative d...
IMG-ALT RSAC 2025 wrap-up – Week in security with Tony Anscombe
A-TITLE RSAC 2025 wrap-up – Week in security with Tony Anscombe
/en/eset-research/thewizards-a...ESET Research TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks ESET Research TheWizards APT group uses SLAAC spoofing to p...
IMG-ALT TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
A-TITLE TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
/en/videos/month-security-tony...Video This month in security with Tony Anscombe – April 2025 edition Video This month in security with Tony Anscombe – April 2025 edition From the near-demis...
IMG-ALT This month in security with Tony Anscombe – April 2025 edition
A-TITLE This month in security with Tony Anscombe – April 2025 edition
/en/mobile-security/how-safe-s...Mobile Security How safe and secure is your iPhone really? Mobile Security How safe and secure is your iPhone really? Your iPhone isn't necessarily as invuln...
IMG-ALT How safe and secure is your iPhone really?
A-TITLE How safe and secure is your iPhone really?
/en/social-media/deepfake-doct...Social Media Deepfake 'doctors' take to TikTok to peddle bogus cures Social Media Deepfake 'doctors' take to TikTok to peddle bogus cures Look out for AI-gen...
IMG-ALT Deepfake 'doctors' take to TikTok to peddle bogus cures
A-TITLE Deepfake 'doctors' take to TikTok to peddle bogus cures
/en/scams/how-fraudsters-abuse...Scams How fraudsters abuse Google Forms to spread scams Scams How fraudsters abuse Google Forms to spread scams The form and quiz-building tool is a popular ...
IMG-ALT How fraudsters abuse Google Forms to spread scams
A-TITLE How fraudsters abuse Google Forms to spread scams
/en/cybersecurity/super-smart-...Digital Security Will super-smart AI be attacking us anytime soon? Digital Security Will super-smart AI be attacking us anytime soon? What practical AI attac...
IMG-ALT Will super-smart AI be attacking us anytime soon?
A-TITLE Will super-smart AI be attacking us anytime soon?
/en/scams/capcut-copycats-prowl/Scams CapCut copycats are on the prowl Scams CapCut copycats are on the prowl Cybercriminals lure content creators with promises of cutting-edge AI wizardry,...
IMG-ALT CapCut copycats are on the prowl
A-TITLE CapCut copycats are on the prowl
/en/malware/theyre-coming-data...Malware They’re coming for your data: What are infostealers and how do I stay safe? Malware They’re coming for your data: What are infostealers and how do I ...
IMG-ALT They’re coming for your data: What are infostealers and how do I stay safe?
A-TITLE They’re coming for your data: What are infostealers and how do I stay safe?
/en/business-security/attacks-...Business Security Attacks on the education sector are surging: How can cyber-defenders respond? Business Security Attacks on the education sector are surging...
IMG-ALT Attacks on the education sector are surging: How can cyber-defenders respond?
A-TITLE Attacks on the education sector are surging: How can cyber-defenders respond?
/en/?page=1Subdomain 1
A-TITLE 1
/en/?page=1Subdomain ...
A-TITLE ...
/en/?page=2Subdomain 2
A-TITLE 2
/en/?page=3Subdomain 3
A-TITLE 3
/en/?page=4Subdomain 4
A-TITLE 4
/en/?page=550Subdomain Text duplicate ...
A-TITLE ...
/en/?page=550Subdomain 550
A-TITLE 550
/en/?page=2Subdomain >
A-TITLE >
/en/eset-research/eset-apt-act...New window Subdomain IMG-ALT Apt Activity Report
A-TITLE Apt Activity Report
https://www.eset.com/int/busin...New window External Subdomain IMG-ALT MDR Protection
A-TITLE MDR Protection
https://www.facebook.com/eset/External Subdomain A-TITLE Join our facebook fan site!
https://youtube.com/esetglobalExternal A-TITLE Watch our videos at YouTube Channel.
https://twitter.com/ESETExternal A-TITLE Visit the official WLS Twitter page.
https://www.linkedin.com/compa...External Subdomain A-TITLE Follow us on LinkedIn.
/rss-configurator/Subdomain A-TITLE Don´t miss a single post!
/en/A-TITLE Welivesecurity
/en/company/about-us/About us
A-TITLE About us
https://www.eset.com/External Subdomain ESET
A-TITLE ESET
/en/company/contact-us/Contact us
A-TITLE Contact us
/en/company/privacy/Privacy Policy
A-TITLE Privacy Policy
/en/company/legal-information/Legal Information
A-TITLE Legal Information
/en/Manage Cookies
A-TITLE Manage Cookies
/en/rss/feed/RSS Feed
A-TITLE RSS Feed
https://www.facebook.com/eset/External Subdomain Text duplicate A-TITLE Join our facebook fan site!
https://youtube.com/esetglobalExternal Text duplicate A-TITLE Watch our videos at YouTube Channel.
https://twitter.com/ESETExternal Text duplicate A-TITLE Visit the official WLS Twitter page.
https://www.linkedin.com/compa...External Subdomain Text duplicate A-TITLE Follow us on LinkedIn.
/rss-configurator/Subdomain Text duplicate A-TITLE Don´t miss a single post!

Server configuration

HTTP redirects
(Critically important)
This page redirects to "https://www.welivesecurity.com/en/"
HTTP header
(Important)
No X-Powered HTTP header is sent.
The web server transmits the web page (HTML) in compressed form.
Performance
(Somewhat important)
The page response time is excellent with 0.16 seconds.
The file size of the HTML document is fine (85 kB).

HTTP Response Header

NameValue
content-typetext/html; charset=UTF-8
referrer-policyno-referrer-when-downgrade
x-xss-protection1; mode=block
x-content-type-optionsnosniff
access-control-allow-origin*
content-security-policydefault-src 'none'; child-src https://disqus.com https://vars.hotjar.com; connect-src 'self' http://ad.doubleclick.net https://*.akamaihd.net https://*.akstat.io https://*.eset.com https://*.hotjar.com https://*.hotjar.io https://adservice.google.com https://captcha.welivesecurity.com https://cc.welivesecurity.com https://cdn.esetstatic.com https://cdn.linkedin.oribi.io https://in.hotjar.com https://px.ads.linkedin.com https://region1.google-analytics.com https://stats.g.doubleclick.net https://trial-eum-clientnsv4-s.akamaihd.net https://trial-eum-clienttons-s.akamaihd.net https://vc.hotjar.io https://ws22.hotjar.com https://ws32.hotjar.com https://www.facebook.com https://www.google-analytics.com https://www.google.com https://www.googletagmanager.com https://www.opinionstage.com wss://*.hotjar.com wss://ws1.hotjar.com; font-src 'self' data: https://script.hotjar.com; form-action 'self' https://enjoy.eset.com; frame-ancestors 'self'; frame-src 'self' https://*.slideshare.net https://bid.g.doubleclick.net https://c.disquscdn.com https://disqus.com https://m.facebook.com https://open.spotify.com/ https://platform.twitter.com https://player.vimeo.com https://share.transistor.fm https://tpc.googlesyndication.com https://vars.hotjar.com https://www.buzzsprout.com https://www.facebook.com https://www.googletagmanager.com https://www.instagram.com https://www.opinionstage.com https://www.podbean.com https://www.screencast.com https://www.slideshare.net https://www.youtube-nocookie.com https://www.youtube.com; img-src 'self' data: https://*.ads.linkedin.com https://*.captcha.eset.com https://*.esetstatic.com https://adservice.google.com https://analytics.twitter.com https://c.disquscdn.com https://captcha.welivesecurity.com https://connect.facebook.net https://googleads.g.doubleclick.net https://px.ads.linkedin.com https://referrer.disqus.com https://region1.google-analytics.com https://script.hotjar.com https://secure.eset.com https://syndication.twitter.com https://t.co https://twitter.com https://www.facebook.com https://www.google-analytics.com https://www.googletagmanager.com https://www.hotjar.com https://www.linkedin.com https://www.youtube.com; manifest-src 'self'; media-src 'self' https://web-assets.esetstatic.com; object-src 'self' https://content.screencast.com; script-src 'self' 'unsafe-eval' 'unsafe-inline' https://a.disquscdn.com https://assets.esetstatic.com https://cdn.esetstatic.com https://connect.facebook.net https://embed.playbuzz.com https://googleads.g.doubleclick.net https://platform.twitter.com https://script.hotjar.com https://snap.licdn.com https://static.ads-twitter.com https://static.hotjar.com https://tpc.googlesyndication.com https://welivesecurity.disqus.com https://www.buzzsprout.com https://www.google-analytics.com https://www.googleadservices.com https://www.googletagmanager.com https://www.instagram.com https://www.opinionstage.com https://www.youtube.com; style-src 'self' 'unsafe-inline' https://assets.esetstatic.com https://c.disquscdn.com https://cdn.esetstatic.com; worker-src 'self'; report-uri https://www-welivesecurity-com.api.cspconsole.com/v1/reports; report-to csp-endpoint;
reporting-endpointscsp-endpoint="https://www-welivesecurity-com.api.cspconsole.com/v1/reports"
x-edps-request-statusnormal
strict-transport-securitymax-age=31536000
x-akamai-transformed9 - 0 pmb=mRUM,2
varyAccept-Encoding
content-encodingbr
cache-controlpublic, max-age=78939
dateWed, 07 May 2025 23:42:19 GMT
content-length15900
server-timingcdn-cache; desc=HIT
statuscode200
http_versionHTTP/2

External factors

This page is referenced by wikipedia.
This website has excellent links from other websites.
This page has backlinks from 158 referring domains.
This page has 504 backlinks.
This page has backlinks from 130 different ip addresses.

Search preview

www.welivesecurity.com
Award-winning news, views, and insight from the ESET security commu...
WeLiveSecurity comes from the brains at ESET - experienced researchers with in-depth knowledge of the latest threats and security trends.

Most important keywords

Following keywords were found. You can check the keyword optimization of this page for each keyword.

KeywordResultRecheck
security66%Check
ESET security63%Check
ESET58%Check
ESET security community57%Check
ESET RESEARCH52%Check
Latest50%Check
Business Security50%Check
Digital security50%Check
Mobile security50%Check
RESEARCH48%Check

Automatically check welivesecurity.com including all subpages at once!

Try for free
Guaranteed free of charge during trial period.

Cookie Policy

We use cookies to make our site work and also for analytics and advertising purposes. You can enable or disable optional cookies as desired. See the following links for more information.

We need these so the site can function properly

So we can better understand how visitors use our website

So we can serve you tailored ads and promotions