Search Engine Optimization Overview
86
100
WeLiveSecurity
WeLiveSecurity is an IT security site covering the latest news, research, cyberthreats and malware discoveries, with insights from ESET experts.
Seo
Title
The title tag is perfect.
WeLiveSecurity
Meta description
The meta description tag is good.
WeLiveSecurity is an IT security site covering the latest news, research, cyberthreats and malware discoveries, with insights from ESET experts.
Headings
There is no h1 tag on the webpage.
  1. Domestic Kitten campaign spying on Iranian citizens with new FurBall malware
  2. POLONIUM targets Israel with Creepy malware
  3. ESET Threat Report T2 2022
  4. Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium
  5. Third‑party cookies: How they work and how to stop them from tracking you across the web
  6. The spy who rented to me? Throwing the spotlight on hidden cameras in Airbnbs
  7. Trick or treat? Stay so cyber‑safe it’s scary – not just on Halloween
  8. The spy who rented to me? Throwing the spotlight on hidden cameras in Airbnbs
  9. Trick or treat? Stay so cyber‑safe it’s scary – not just on Halloween
  10. Courts vs. cybercrime – Week in security with Tony Anscombe
  11. Why your phone is slow – and how to speed it up
  12. Parcel delivery scams are on the rise: Do you know what to watch out for?
  13. 5 reasons to keep your software and devices up to date
  14. APT‑C‑50 updates FurBall Android malware – Week in security with Tony Anscombe
  15. Domestic Kitten campaign spying on Iranian citizens with new FurBall malware
  16. Don’t get scammed when buying tickets online
  17. 5 steps to protect your school from cyberattacks
  18. ESET research into POLONIUM’s arsenal – Week in security with Tony Anscombe
  19. Life in pursuit of answers: In the words of Ada Yonath
  20. 10 common Zelle scams – and how to avoid them
  21. POLONIUM targets Israel with Creepy malware
  22. Steam account hacked? Here’s how to get it back
  23. Key takeaways from ESET Threat Report T2 2022 – Week in security with Tony Anscombe
  24. The need to change cybersecurity for the next generation
  25. ESET Threat Report T2 2022
  26. 8 questions to ask yourself before getting a home security camera
  27. ESET research into new attacks by Lazarus – Week in security with Tony Anscombe
  1. Latest Articles
  2. Follow us
  3. Newsletter – Ukraine Crisis section
  4. Newsletter
  5. Categories
  6. Our experts
Content keywords
The content has relevant keywords.
welivesecurity
Image keywords
All images have alt attributes set.
SEO friendly URL
The URL is SEO friendly.
https://www.welivesecurity.com/
404 page
The website has 404 error pages.
https://www.welivesecurity.com/404-4b42fdbe6402c115b9a6135133ccf0f0
Robots.txt
The webpage can be accessed by search engines.
Noindex
The webpage does not have a noindex tag set.
In-page links
The webpage contains more than 150 links.
  1. https://www.welivesecurity.com/
  2. https://www.welivesecurity.com/
  3. Em Português
  4. En français
  5. En Español
  6. In Deutsch
  7. All Posts
  8. We Live Progress
  9. Research
  10. How To
  11. Videos
  12. Conference Materials
  13. White Papers
  14. Threat Reports
  15. Our Experts
  16. Em Português
  17. En français
  18. En Español
  19. In Deutsch
  20. https://www.welivesecurity.com/
  21. https://www.welivesecurity.com/
  22. ESET Research Domestic Kitten campaign spying on Iranian citizens with new FurBall malware Lukas Stefanko 20 Oct 2022 - 11:30AM
  23. ESET Research POLONIUM targets Israel with Creepy malware Matías Porolli 11 Oct 2022 - 11:30AM
  24. Threat Reports ESET Threat Report T2 2022 Roman Kovac 5 Oct 2022 - 11:30AM
  25. ESET Research Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium Peter Kálnai 30 Sep 2022 - 12:00PM
  26. How To Third‑party cookies: How they work and how to stop them from tracking you across the web Rene Holt 15 Sep 2022 - 11:30AM
  27. Privacy The spy who rented to me? Throwing the spotlight on hidden cameras in Airbnbs
  28. Scams Trick or treat? Stay so cyber‑safe it’s scary – not just on Halloween
  29. Popular Articles
  30. Privacy
  31. https://www.welivesecurity.com/2022/11/01/spy-who-rented-to-me-hidden-cameras-airbnbs/
  32. The spy who rented to me? Throwing the spotlight on hidden cameras in Airbnbs
  33. Phil Muncaster
  34. Scams
  35. https://www.welivesecurity.com/2022/10/31/trick-treat-stay-cyber-safe-scary-halloween/
  36. Trick or treat? Stay so cyber‑safe it’s scary – not just on Halloween
  37. André Lameiras
  38. Videos
  39. https://www.welivesecurity.com/videos/courts-vs-cybercrime-week-security-tony-anscombe/
  40. Courts vs. cybercrime – Week in security with Tony Anscombe
  41. Editor
  42. Mobile Security
  43. https://www.welivesecurity.com/2022/10/27/why-your-phone-slow-how-speed-up/
  44. Why your phone is slow – and how to speed it up
  45. André Lameiras
  46. Scams
  47. https://www.welivesecurity.com/2022/10/26/parcel-delivery-scams-know-what-watch-out-for/
  48. Parcel delivery scams are on the rise: Do you know what to watch out for?
  49. Phil Muncaster
  50. Cybersecurity
  51. https://www.welivesecurity.com/2022/10/24/5-reasons-keep-software-devices-up-to-date/
  52. 5 reasons to keep your software and devices up to date
  53. Phil Muncaster
  54. Videos
  55. https://www.welivesecurity.com/videos/apt-c-50-updates-furball-android-malware-week-security-tony-anscombe/
  56. APT‑C‑50 updates FurBall Android malware – Week in security with Tony Anscombe
  57. Editor
  58. ESET Research
  59. https://www.welivesecurity.com/2022/10/20/domestic-kitten-campaign-spying-iranian-citizens-furball-malware/
  60. Domestic Kitten campaign spying on Iranian citizens with new FurBall malware
  61. Lukas Stefanko
  62. Scams
  63. https://www.welivesecurity.com/2022/10/19/dont-get-scammed-buying-tickets-online/
  64. Don’t get scammed when buying tickets online
  65. Jake Moore
  66. Cybersecurity
  67. https://www.welivesecurity.com/2022/10/17/5-steps-protect-school-cyberattacks/
  68. 5 steps to protect your school from cyberattacks
  69. André Lameiras
  70. Videos
  71. https://www.welivesecurity.com/videos/eset-research-poloniums-creepy-toolset-week-security-tony-anscombe/
  72. ESET research into POLONIUM’s arsenal – Week in security with Tony Anscombe
  73. Editor
  74. We Live Progress
  75. https://www.welivesecurity.com/2022/10/13/life-pursuit-answers-words-ada-yonath/
  76. Life in pursuit of answers: In the words of Ada Yonath
  77. Alžbeta Kovaľová
  78. Scams
  79. https://www.welivesecurity.com/2022/10/12/how-scammers-target-zelle-users-stay-safe/
  80. 10 common Zelle scams – and how to avoid them
  81. Phil Muncaster
  82. ESET Research
  83. https://www.welivesecurity.com/2022/10/11/polonium-targets-israel-creepy-malware/
  84. POLONIUM targets Israel with Creepy malware
  85. Matías Porolli
  86. How To
  87. https://www.welivesecurity.com/2022/10/10/steam-account-stolen-how-get-back/
  88. Steam account hacked? Here’s how to get it back
  89. Martina López
  90. Videos
  91. https://www.welivesecurity.com/videos/key-takeaways-eset-threat-report-t2-2022-week-security-tony-anscombe/
  92. Key takeaways from ESET Threat Report T2 2022 – Week in security with Tony Anscombe
  93. Editor
  94. Cybersecurity
  95. https://www.welivesecurity.com/2022/10/06/need-change-cybersecurity-next-generation/
  96. The need to change cybersecurity for the next generation
  97. Tony Anscombe
  98. Threat Reports
  99. https://www.welivesecurity.com/2022/10/05/eset-threat-report-t2-2022/
  100. ESET Threat Report T2 2022
  101. Roman Kovac
  102. Internet of Things
  103. https://www.welivesecurity.com/2022/10/03/8-questions-ask-yourself-getting-home-security-camera/
  104. 8 questions to ask yourself before getting a home security camera
  105. Phil Muncaster
  106. Videos
  107. https://www.welivesecurity.com/videos/eset-research-uncovers-new-lazarus-campaigns-week-security-tony-anscombe/
  108. ESET research into new attacks by Lazarus – Week in security with Tony Anscombe
  109. Editor
  110. 2
  111. 3
  112. 4
  113. 5
  114. 10
  115. 20
  116. 30
  117. Next
  118. https://www.welivesecurity.com/2022/10/05/eset-threat-report-t2-2022/
  119. https://www.welivesecurity.com/category/ukraine-crisis-digital-security-resource-center/
  120. https://www.welivesecurity.com/rss-configurator/
  121. Cybercrime
  122. Malware
  123. Cybersecurity
  124. Privacy
  125. Password
  126. Scams
  127. How To
  128. Vulnerability
  129. Hacking
  130. Android
  131. Mobile Security
  132. Ransomware
  133. data protection
  134. Kids Online
  135. Social Media
  136. COVID-19
  137. Internet of Things
  138. Ukraine Crisis – Digital Security Resource Center
  139. We Live Progress
  140. Threat Reports
  141. Secure coding
  142. FinTech
  143. Cameron Camp
  144. Anton Cherepanov
  145. Aryeh Goretsky
  146. Lukas Stefanko
  147. Jake Moore
  148. Marc-Etienne M.Léveillé
  149. Robert Lipovsky
  150. Tony Anscombe
  151. Jean-Ian Boutin
  152. All experts
  153. https://www.welivesecurity.com/
  154. https://www.welivesecurity.com/
  155. https://www.welivesecurity.com/
  156. Home
  157. About Us
  158. Contact Us
  159. Sitemap
  160. Our Experts
  161. Research
  162. How To
  163. Categories
  164. RSS Configurator
  165. Privacy policy
  166. Legal information
Language
The webpage has the language declared.
en-US
Favicon
The webpage has a favicon.
https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/favicon.ico
Performance
Text compression
The HTML file is compressed.
Load time
The webpage loaded in 0.12 seconds.
Page size
The size of the HTML webpage is 14,229.00.
HTTP requests
The webpage makes more than 50.00 HTTP requests.
  1. https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/js/main.js?id=fef3139dcedd23afc232
  2. https://www.welivesecurity.com/wp-content/plugins/disqus-comment-system/public/js/comment_count.js?ver=3.0.16
  1. https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/css/main.css?id=b3e7fe8a6c3736dca145
  1. https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-dark-header-1.svg
  2. https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-dark-header-2.svg
  3. https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-light-header-1.svg
  4. https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-light-header-2.svg
  5. https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-dark-header-1.svg
  6. https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-dark-header-2.svg
  7. https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-light-header-1.svg
  8. https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-light-header-2.svg
  9. https://www.welivesecurity.com/wp-content/uploads/2016/02/LukasStefanko_BW-150x150.jpg
  10. https://www.welivesecurity.com/wp-content/uploads/2015/01/matias_porolli_eset-150x150.jpg
  11. https://www.welivesecurity.com/wp-content/uploads/2020/04/Roman_Kovac-150x150.jpg
  12. https://www.welivesecurity.com/wp-content/uploads/2016/12/kalnai_peter_photo-150x150.png
  13. https://www.welivesecurity.com/wp-content/uploads/2021/10/Rene_Holt-150x150.jpg
  14. https://www.welivesecurity.com/wp-content/uploads/2022/11/hidden-cameras-airbnb-623x432.jpg
  15. https://www.welivesecurity.com/wp-content/uploads/2022/10/trick-or-treat-halloween-cybersecurity-tips-623x432.jpg
  16. https://www.welivesecurity.com/wp-content/uploads/2022/10/0-30.jpg
  17. https://www.welivesecurity.com/wp-content/uploads/2022/10/phone-android-ios-iphone-slow-tips-speeding-up-Copy-623x432.jpg
  18. https://www.welivesecurity.com/wp-content/uploads/2022/10/parcel-delivery-scams-email-phishing-623x432.jpg
  19. https://www.welivesecurity.com/wp-content/uploads/2022/10/updates-software-devices-importance-1024x576-1-623x432.jpg
  20. https://www.welivesecurity.com/wp-content/uploads/2022/10/0-17.jpg
  21. https://www.welivesecurity.com/wp-content/uploads/2022/10/domestic-kitten-apt-furball-malware-iran-623x432.jpg
  22. https://www.welivesecurity.com/wp-content/uploads/2022/10/fake-online-tickets-scams-623x432.jpg
  23. https://www.welivesecurity.com/wp-content/uploads/2022/10/cybersecurity-schools-teachers-admins-623x415.jpg
  24. https://www.welivesecurity.com/wp-content/uploads/2022/10/0-11.jpg
  25. https://www.welivesecurity.com/wp-content/uploads/2022/10/eset-science-award-623x432.jpg
  26. https://www.welivesecurity.com/wp-content/uploads/2022/10/zelle-scams-fraud-p2p-payment-apps-623x416.jpg
  27. https://www.welivesecurity.com/wp-content/uploads/2022/10/polonium-apt-group-malware-israel-targeted-623x415.jpg
  28. https://www.welivesecurity.com/wp-content/uploads/2022/09/robaron-cuneta-stem-como-recuperarla.jpg
  29. https://www.welivesecurity.com/wp-content/uploads/2022/10/0-2.jpg
  30. https://www.welivesecurity.com/wp-content/uploads/2022/10/csam-cybersecurity-approach-future-623x415.jpg
  31. https://www.welivesecurity.com/wp-content/uploads/2022/10/eset-threat-report-t2-2022-623x432.jpg
  32. https://www.welivesecurity.com/wp-content/uploads/2022/10/security-camera-privacy-risks-623x415.jpg
  33. https://www.welivesecurity.com/wp-content/uploads/2022/09/0-42.jpg
  34. https://www.welivesecurity.com/wp-content/uploads/2022/10/eset-threat-report-t2-2022-1.jpg
  35. https://www.welivesecurity.com/wp-content/uploads/2022/03/ukraine-crisis-digital-security-resource-center-1.jpg
  36. https://www.welivesecurity.com/wp-content/uploads/2013/01/cameron_camp_crop-150x150.jpg
  37. https://www.welivesecurity.com/wp-content/uploads/2020/03/Anton_Cherepanov-150x150.jpg
  38. https://www.welivesecurity.com/wp-content/uploads/2013/01/Kw_Aryeh_Goretsky-3retouch1-150x150.jpg
  39. https://www.welivesecurity.com/wp-content/uploads/2016/02/LukasStefanko_BW-150x150.jpg
  40. https://www.welivesecurity.com/wp-content/uploads/2018/11/2018-08_09_JakeMoore_Eset_007a-150x150.jpg
  41. https://www.welivesecurity.com/wp-content/uploads/2013/06/Marc-Etienne-M.Leveille-150x150.png
  42. https://www.welivesecurity.com/wp-content/uploads/2013/01/robert_lipovsky-150x150.jpeg
  43. https://www.welivesecurity.com/wp-content/uploads/2017/05/MFE_5108-BW-150x150.png
  44. https://www.welivesecurity.com/wp-content/uploads/2013/01/jean-ianboutin-150x150.jpg
  45. https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-footer-1.svg
  46. https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-footer-2.svg
  47. https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-dark-header-1.svg
  48. https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-dark-header-2.svg
  49. https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-light-header-1.svg
  50. https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-light-header-2.svg
  1. https://www.googletagmanager.com/ns.html?id=GTM-PMDGSM
Image format
There are 36 images that are not using the AVIF, WebP format.
  1. https://www.welivesecurity.com/wp-content/uploads/2016/02/LukasStefanko_BW-150x150.jpg
  2. https://www.welivesecurity.com/wp-content/uploads/2015/01/matias_porolli_eset-150x150.jpg
  3. https://www.welivesecurity.com/wp-content/uploads/2020/04/Roman_Kovac-150x150.jpg
  4. https://www.welivesecurity.com/wp-content/uploads/2016/12/kalnai_peter_photo-150x150.png
  5. https://www.welivesecurity.com/wp-content/uploads/2021/10/Rene_Holt-150x150.jpg
  6. https://www.welivesecurity.com/wp-content/uploads/2022/11/hidden-cameras-airbnb-623x432.jpg
  7. https://www.welivesecurity.com/wp-content/uploads/2022/10/trick-or-treat-halloween-cybersecurity-tips-623x432.jpg
  8. https://www.welivesecurity.com/wp-content/uploads/2022/10/0-30.jpg
  9. https://www.welivesecurity.com/wp-content/uploads/2022/10/phone-android-ios-iphone-slow-tips-speeding-up-Copy-623x432.jpg
  10. https://www.welivesecurity.com/wp-content/uploads/2022/10/parcel-delivery-scams-email-phishing-623x432.jpg
  11. https://www.welivesecurity.com/wp-content/uploads/2022/10/updates-software-devices-importance-1024x576-1-623x432.jpg
  12. https://www.welivesecurity.com/wp-content/uploads/2022/10/0-17.jpg
  13. https://www.welivesecurity.com/wp-content/uploads/2022/10/domestic-kitten-apt-furball-malware-iran-623x432.jpg
  14. https://www.welivesecurity.com/wp-content/uploads/2022/10/fake-online-tickets-scams-623x432.jpg
  15. https://www.welivesecurity.com/wp-content/uploads/2022/10/cybersecurity-schools-teachers-admins-623x415.jpg
  16. https://www.welivesecurity.com/wp-content/uploads/2022/10/0-11.jpg
  17. https://www.welivesecurity.com/wp-content/uploads/2022/10/eset-science-award-623x432.jpg
  18. https://www.welivesecurity.com/wp-content/uploads/2022/10/zelle-scams-fraud-p2p-payment-apps-623x416.jpg
  19. https://www.welivesecurity.com/wp-content/uploads/2022/10/polonium-apt-group-malware-israel-targeted-623x415.jpg
  20. https://www.welivesecurity.com/wp-content/uploads/2022/09/robaron-cuneta-stem-como-recuperarla.jpg
  21. https://www.welivesecurity.com/wp-content/uploads/2022/10/0-2.jpg
  22. https://www.welivesecurity.com/wp-content/uploads/2022/10/csam-cybersecurity-approach-future-623x415.jpg
  23. https://www.welivesecurity.com/wp-content/uploads/2022/10/eset-threat-report-t2-2022-623x432.jpg
  24. https://www.welivesecurity.com/wp-content/uploads/2022/10/security-camera-privacy-risks-623x415.jpg
  25. https://www.welivesecurity.com/wp-content/uploads/2022/09/0-42.jpg
  26. https://www.welivesecurity.com/wp-content/uploads/2022/10/eset-threat-report-t2-2022-1.jpg
  27. https://www.welivesecurity.com/wp-content/uploads/2022/03/ukraine-crisis-digital-security-resource-center-1.jpg
  28. https://www.welivesecurity.com/wp-content/uploads/2013/01/cameron_camp_crop-150x150.jpg
  29. https://www.welivesecurity.com/wp-content/uploads/2020/03/Anton_Cherepanov-150x150.jpg
  30. https://www.welivesecurity.com/wp-content/uploads/2013/01/Kw_Aryeh_Goretsky-3retouch1-150x150.jpg
  31. https://www.welivesecurity.com/wp-content/uploads/2016/02/LukasStefanko_BW-150x150.jpg
  32. https://www.welivesecurity.com/wp-content/uploads/2018/11/2018-08_09_JakeMoore_Eset_007a-150x150.jpg
  33. https://www.welivesecurity.com/wp-content/uploads/2013/06/Marc-Etienne-M.Leveille-150x150.png
  34. https://www.welivesecurity.com/wp-content/uploads/2013/01/robert_lipovsky-150x150.jpeg
  35. https://www.welivesecurity.com/wp-content/uploads/2017/05/MFE_5108-BW-150x150.png
  36. https://www.welivesecurity.com/wp-content/uploads/2013/01/jean-ianboutin-150x150.jpg
JavaScript defer
The are 2 javascript resources without the defer attribute.
  1. https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/js/main.js?id=fef3139dcedd23afc232
  2. https://www.welivesecurity.com/wp-content/plugins/disqus-comment-system/public/js/comment_count.js?ver=3.0.16
DOM size
The DOM size is optimal.
The HTML file has 702 DOM nodes.
Security
HTTPS encryption
The webpage uses HTTPS encryption.
The HTML file has https://www.welivesecurity.com/ DOM nodes.
Mixed content
There are no mixed content resources on the webpage.
Server signature
The webpage does not have a public server signature.
Unsafe cross-origin links
The webpage does not have unsafe cross-origin links.
Plaintext email
The webpage does not contain any plaintext emails.
Miscellaneous
Structured data
The webpage has structured data.
        Meta viewport
        The webpage has a meta viewport tag set.
        width=device-width, initial-scale=1
        Character set
        The webpage has a charset value set.
        utf-8
        Sitemap
        No sitemaps found.
        Content length
        The webpage has 1,650 words.
        Text to HTML ratio
        The text to HTML ratio is 13%.
        Inline CSS
        The webpage contains inline CSS code.
        1. display:none;visibility:hidden
        2. background-image: url('/wp-content/uploads/2022/10/domestic-kitten-apt-furball-malware-iran-601x426.jpg'); background-position: 50% 50%;
        3. background-image: url('/wp-content/uploads/2022/10/polonium-apt-group-malware-israel-targeted-601x415.jpg'); background-position: 50% 50%;
        4. background-image: url('/wp-content/uploads/2022/10/eset-threat-report-t2-2022-601x426.jpg'); background-position: 50% 50%;
        5. background-image: url('/wp-content/uploads/2022/09/lazarus-apt-eset-research-amazon-netherlands-belgium-601x415.jpg'); background-position: 50% 50%;
        6. background-image: url('/wp-content/uploads/2022/09/third-party-cookies-blocking-privacy-601x415.jpg'); background-position: 50% 50%;
        7. background-image: url('/wp-content/uploads/2022/11/hidden-cameras-airbnb-601x426.jpg'); background-position: 50% 50%;
        8. background-image: url('/wp-content/uploads/2022/10/trick-or-treat-halloween-cybersecurity-tips-601x426.jpg'); background-position: 50% 50%;
        Deprecated HTML
        There are no deprecated HTML tags on the webpage.