Search Engine Optimization Overview
86
100
WeLiveSecurity
WeLiveSecurity is an IT security site covering the latest news, research, cyberthreats and malware discoveries, with insights from ESET experts.
Seo
Title
The title tag is perfect.
WeLiveSecurity
Meta description
The meta description tag is good.
WeLiveSecurity is an IT security site covering the latest news, research, cyberthreats and malware discoveries, with insights from ESET experts.
Headings
There is no h1 tag on the webpage.
h2
27- Domestic Kitten campaign spying on Iranian citizens with new FurBall malware
- POLONIUM targets Israel with Creepy malware
- ESET Threat Report T2 2022
- Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium
- Third‑party cookies: How they work and how to stop them from tracking you across the web
- The spy who rented to me? Throwing the spotlight on hidden cameras in Airbnbs
- Trick or treat? Stay so cyber‑safe it’s scary – not just on Halloween
- The spy who rented to me? Throwing the spotlight on hidden cameras in Airbnbs
- Trick or treat? Stay so cyber‑safe it’s scary – not just on Halloween
- Courts vs. cybercrime – Week in security with Tony Anscombe
- Why your phone is slow – and how to speed it up
- Parcel delivery scams are on the rise: Do you know what to watch out for?
- 5 reasons to keep your software and devices up to date
- APT‑C‑50 updates FurBall Android malware – Week in security with Tony Anscombe
- Domestic Kitten campaign spying on Iranian citizens with new FurBall malware
- Don’t get scammed when buying tickets online
- 5 steps to protect your school from cyberattacks
- ESET research into POLONIUM’s arsenal – Week in security with Tony Anscombe
- Life in pursuit of answers: In the words of Ada Yonath
- 10 common Zelle scams – and how to avoid them
- POLONIUM targets Israel with Creepy malware
- Steam account hacked? Here’s how to get it back
- Key takeaways from ESET Threat Report T2 2022 – Week in security with Tony Anscombe
- The need to change cybersecurity for the next generation
- ESET Threat Report T2 2022
- 8 questions to ask yourself before getting a home security camera
- ESET research into new attacks by Lazarus – Week in security with Tony Anscombe
h3
7- Latest Articles
- Follow us
- Newsletter – Ukraine Crisis section
- Newsletter
- Categories
- Our experts
Content keywords
The content has relevant keywords.
welivesecurity
Image keywords
All images have alt attributes set.
SEO friendly URL
The URL is SEO friendly.
https://www.welivesecurity.com/
404 page
The website has 404 error pages.
https://www.welivesecurity.com/404-4b42fdbe6402c115b9a6135133ccf0f0
Robots.txt
The webpage can be accessed by search engines.
Noindex
The webpage does not have a noindex tag set.
In-page links
The webpage contains more than 150 links.
Internals
166- https://www.welivesecurity.com/
- https://www.welivesecurity.com/
- Em Português
- En français
- En Español
- In Deutsch
- All Posts
- We Live Progress
- Research
- How To
- Videos
- Conference Materials
- White Papers
- Threat Reports
- Our Experts
- Em Português
- En français
- En Español
- In Deutsch
- https://www.welivesecurity.com/
- https://www.welivesecurity.com/
- ESET Research Domestic Kitten campaign spying on Iranian citizens with new FurBall malware Lukas Stefanko 20 Oct 2022 - 11:30AM
- ESET Research POLONIUM targets Israel with Creepy malware Matías Porolli 11 Oct 2022 - 11:30AM
- Threat Reports ESET Threat Report T2 2022 Roman Kovac 5 Oct 2022 - 11:30AM
- ESET Research Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium Peter Kálnai 30 Sep 2022 - 12:00PM
- How To Third‑party cookies: How they work and how to stop them from tracking you across the web Rene Holt 15 Sep 2022 - 11:30AM
- Privacy The spy who rented to me? Throwing the spotlight on hidden cameras in Airbnbs
- Scams Trick or treat? Stay so cyber‑safe it’s scary – not just on Halloween
- Popular Articles
- Privacy
- https://www.welivesecurity.com/2022/11/01/spy-who-rented-to-me-hidden-cameras-airbnbs/
- The spy who rented to me? Throwing the spotlight on hidden cameras in Airbnbs
- Phil Muncaster
- Scams
- https://www.welivesecurity.com/2022/10/31/trick-treat-stay-cyber-safe-scary-halloween/
- Trick or treat? Stay so cyber‑safe it’s scary – not just on Halloween
- André Lameiras
- Videos
- https://www.welivesecurity.com/videos/courts-vs-cybercrime-week-security-tony-anscombe/
- Courts vs. cybercrime – Week in security with Tony Anscombe
- Editor
- Mobile Security
- https://www.welivesecurity.com/2022/10/27/why-your-phone-slow-how-speed-up/
- Why your phone is slow – and how to speed it up
- André Lameiras
- Scams
- https://www.welivesecurity.com/2022/10/26/parcel-delivery-scams-know-what-watch-out-for/
- Parcel delivery scams are on the rise: Do you know what to watch out for?
- Phil Muncaster
- Cybersecurity
- https://www.welivesecurity.com/2022/10/24/5-reasons-keep-software-devices-up-to-date/
- 5 reasons to keep your software and devices up to date
- Phil Muncaster
- Videos
- https://www.welivesecurity.com/videos/apt-c-50-updates-furball-android-malware-week-security-tony-anscombe/
- APT‑C‑50 updates FurBall Android malware – Week in security with Tony Anscombe
- Editor
- ESET Research
- https://www.welivesecurity.com/2022/10/20/domestic-kitten-campaign-spying-iranian-citizens-furball-malware/
- Domestic Kitten campaign spying on Iranian citizens with new FurBall malware
- Lukas Stefanko
- Scams
- https://www.welivesecurity.com/2022/10/19/dont-get-scammed-buying-tickets-online/
- Don’t get scammed when buying tickets online
- Jake Moore
- Cybersecurity
- https://www.welivesecurity.com/2022/10/17/5-steps-protect-school-cyberattacks/
- 5 steps to protect your school from cyberattacks
- André Lameiras
- Videos
- https://www.welivesecurity.com/videos/eset-research-poloniums-creepy-toolset-week-security-tony-anscombe/
- ESET research into POLONIUM’s arsenal – Week in security with Tony Anscombe
- Editor
- We Live Progress
- https://www.welivesecurity.com/2022/10/13/life-pursuit-answers-words-ada-yonath/
- Life in pursuit of answers: In the words of Ada Yonath
- Alžbeta Kovaľová
- Scams
- https://www.welivesecurity.com/2022/10/12/how-scammers-target-zelle-users-stay-safe/
- 10 common Zelle scams – and how to avoid them
- Phil Muncaster
- ESET Research
- https://www.welivesecurity.com/2022/10/11/polonium-targets-israel-creepy-malware/
- POLONIUM targets Israel with Creepy malware
- Matías Porolli
- How To
- https://www.welivesecurity.com/2022/10/10/steam-account-stolen-how-get-back/
- Steam account hacked? Here’s how to get it back
- Martina López
- Videos
- https://www.welivesecurity.com/videos/key-takeaways-eset-threat-report-t2-2022-week-security-tony-anscombe/
- Key takeaways from ESET Threat Report T2 2022 – Week in security with Tony Anscombe
- Editor
- Cybersecurity
- https://www.welivesecurity.com/2022/10/06/need-change-cybersecurity-next-generation/
- The need to change cybersecurity for the next generation
- Tony Anscombe
- Threat Reports
- https://www.welivesecurity.com/2022/10/05/eset-threat-report-t2-2022/
- ESET Threat Report T2 2022
- Roman Kovac
- Internet of Things
- https://www.welivesecurity.com/2022/10/03/8-questions-ask-yourself-getting-home-security-camera/
- 8 questions to ask yourself before getting a home security camera
- Phil Muncaster
- Videos
- https://www.welivesecurity.com/videos/eset-research-uncovers-new-lazarus-campaigns-week-security-tony-anscombe/
- ESET research into new attacks by Lazarus – Week in security with Tony Anscombe
- Editor
- 2
- 3
- 4
- 5
- 10
- 20
- 30
- Next
- https://www.welivesecurity.com/2022/10/05/eset-threat-report-t2-2022/
- https://www.welivesecurity.com/category/ukraine-crisis-digital-security-resource-center/
- https://www.welivesecurity.com/rss-configurator/
- Cybercrime
- Malware
- Cybersecurity
- Privacy
- Password
- Scams
- How To
- Vulnerability
- Hacking
- Android
- Mobile Security
- Ransomware
- data protection
- Kids Online
- Social Media
- COVID-19
- Internet of Things
- Ukraine Crisis – Digital Security Resource Center
- We Live Progress
- Threat Reports
- Secure coding
- FinTech
- Cameron Camp
- Anton Cherepanov
- Aryeh Goretsky
- Lukas Stefanko
- Jake Moore
- Marc-Etienne M.Léveillé
- Robert Lipovsky
- Tony Anscombe
- Jean-Ian Boutin
- All experts
- https://www.welivesecurity.com/
- https://www.welivesecurity.com/
- https://www.welivesecurity.com/
- Home
- About Us
- Contact Us
- Sitemap
- Our Experts
- Research
- How To
- Categories
- RSS Configurator
- Privacy policy
- Legal information
Externals
13- https://www.eset.com
- https://www.eset.com
- Ukraine Crisis – Digital Security Resource Center
- https://www.eset.com
- https://www.eset.com
- https://www.facebook.com/eset/
- http://www.youtube.com/esetglobal
- http://twitter.com/welivesecurity
- https://www.linkedin.com/company/eset
- https://www.eset.com
- https://www.eset.com
- https://www.eset.com
- ESET
Language
The webpage has the language declared.
en-US
Favicon
The webpage has a favicon.
https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/favicon.ico
Performance
Text compression
The HTML file is compressed.
Load time
The webpage loaded in 0.12 seconds.
Page size
The size of the HTML webpage is 14,229.00.
HTTP requests
The webpage makes more than 50.00 HTTP requests.
JavaScripts
2- https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/js/main.js?id=fef3139dcedd23afc232
- https://www.welivesecurity.com/wp-content/plugins/disqus-comment-system/public/js/comment_count.js?ver=3.0.16
CSS
1- https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/css/main.css?id=b3e7fe8a6c3736dca145
Images
50- https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-dark-header-1.svg
- https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-dark-header-2.svg
- https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-light-header-1.svg
- https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-light-header-2.svg
- https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-dark-header-1.svg
- https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-dark-header-2.svg
- https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-light-header-1.svg
- https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-light-header-2.svg
- https://www.welivesecurity.com/wp-content/uploads/2016/02/LukasStefanko_BW-150x150.jpg
- https://www.welivesecurity.com/wp-content/uploads/2015/01/matias_porolli_eset-150x150.jpg
- https://www.welivesecurity.com/wp-content/uploads/2020/04/Roman_Kovac-150x150.jpg
- https://www.welivesecurity.com/wp-content/uploads/2016/12/kalnai_peter_photo-150x150.png
- https://www.welivesecurity.com/wp-content/uploads/2021/10/Rene_Holt-150x150.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/11/hidden-cameras-airbnb-623x432.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/trick-or-treat-halloween-cybersecurity-tips-623x432.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/0-30.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/phone-android-ios-iphone-slow-tips-speeding-up-Copy-623x432.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/parcel-delivery-scams-email-phishing-623x432.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/updates-software-devices-importance-1024x576-1-623x432.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/0-17.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/domestic-kitten-apt-furball-malware-iran-623x432.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/fake-online-tickets-scams-623x432.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/cybersecurity-schools-teachers-admins-623x415.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/0-11.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/eset-science-award-623x432.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/zelle-scams-fraud-p2p-payment-apps-623x416.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/polonium-apt-group-malware-israel-targeted-623x415.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/09/robaron-cuneta-stem-como-recuperarla.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/0-2.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/csam-cybersecurity-approach-future-623x415.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/eset-threat-report-t2-2022-623x432.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/security-camera-privacy-risks-623x415.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/09/0-42.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/eset-threat-report-t2-2022-1.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/03/ukraine-crisis-digital-security-resource-center-1.jpg
- https://www.welivesecurity.com/wp-content/uploads/2013/01/cameron_camp_crop-150x150.jpg
- https://www.welivesecurity.com/wp-content/uploads/2020/03/Anton_Cherepanov-150x150.jpg
- https://www.welivesecurity.com/wp-content/uploads/2013/01/Kw_Aryeh_Goretsky-3retouch1-150x150.jpg
- https://www.welivesecurity.com/wp-content/uploads/2016/02/LukasStefanko_BW-150x150.jpg
- https://www.welivesecurity.com/wp-content/uploads/2018/11/2018-08_09_JakeMoore_Eset_007a-150x150.jpg
- https://www.welivesecurity.com/wp-content/uploads/2013/06/Marc-Etienne-M.Leveille-150x150.png
- https://www.welivesecurity.com/wp-content/uploads/2013/01/robert_lipovsky-150x150.jpeg
- https://www.welivesecurity.com/wp-content/uploads/2017/05/MFE_5108-BW-150x150.png
- https://www.welivesecurity.com/wp-content/uploads/2013/01/jean-ianboutin-150x150.jpg
- https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-footer-1.svg
- https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-footer-2.svg
- https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-dark-header-1.svg
- https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-dark-header-2.svg
- https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-light-header-1.svg
- https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/img/new-logo/eset-wls-light-header-2.svg
Iframes
1- https://www.googletagmanager.com/ns.html?id=GTM-PMDGSM
Image format
There are 36 images that are not using the AVIF, WebP format.
Images
36- https://www.welivesecurity.com/wp-content/uploads/2016/02/LukasStefanko_BW-150x150.jpg
- https://www.welivesecurity.com/wp-content/uploads/2015/01/matias_porolli_eset-150x150.jpg
- https://www.welivesecurity.com/wp-content/uploads/2020/04/Roman_Kovac-150x150.jpg
- https://www.welivesecurity.com/wp-content/uploads/2016/12/kalnai_peter_photo-150x150.png
- https://www.welivesecurity.com/wp-content/uploads/2021/10/Rene_Holt-150x150.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/11/hidden-cameras-airbnb-623x432.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/trick-or-treat-halloween-cybersecurity-tips-623x432.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/0-30.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/phone-android-ios-iphone-slow-tips-speeding-up-Copy-623x432.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/parcel-delivery-scams-email-phishing-623x432.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/updates-software-devices-importance-1024x576-1-623x432.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/0-17.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/domestic-kitten-apt-furball-malware-iran-623x432.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/fake-online-tickets-scams-623x432.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/cybersecurity-schools-teachers-admins-623x415.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/0-11.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/eset-science-award-623x432.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/zelle-scams-fraud-p2p-payment-apps-623x416.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/polonium-apt-group-malware-israel-targeted-623x415.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/09/robaron-cuneta-stem-como-recuperarla.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/0-2.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/csam-cybersecurity-approach-future-623x415.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/eset-threat-report-t2-2022-623x432.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/security-camera-privacy-risks-623x415.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/09/0-42.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/10/eset-threat-report-t2-2022-1.jpg
- https://www.welivesecurity.com/wp-content/uploads/2022/03/ukraine-crisis-digital-security-resource-center-1.jpg
- https://www.welivesecurity.com/wp-content/uploads/2013/01/cameron_camp_crop-150x150.jpg
- https://www.welivesecurity.com/wp-content/uploads/2020/03/Anton_Cherepanov-150x150.jpg
- https://www.welivesecurity.com/wp-content/uploads/2013/01/Kw_Aryeh_Goretsky-3retouch1-150x150.jpg
- https://www.welivesecurity.com/wp-content/uploads/2016/02/LukasStefanko_BW-150x150.jpg
- https://www.welivesecurity.com/wp-content/uploads/2018/11/2018-08_09_JakeMoore_Eset_007a-150x150.jpg
- https://www.welivesecurity.com/wp-content/uploads/2013/06/Marc-Etienne-M.Leveille-150x150.png
- https://www.welivesecurity.com/wp-content/uploads/2013/01/robert_lipovsky-150x150.jpeg
- https://www.welivesecurity.com/wp-content/uploads/2017/05/MFE_5108-BW-150x150.png
- https://www.welivesecurity.com/wp-content/uploads/2013/01/jean-ianboutin-150x150.jpg
JavaScript defer
The are 2 javascript resources without the defer attribute.
JavaScripts
2- https://www.welivesecurity.com/wp-content/themes/eset-wls-2018/assets/js/main.js?id=fef3139dcedd23afc232
- https://www.welivesecurity.com/wp-content/plugins/disqus-comment-system/public/js/comment_count.js?ver=3.0.16
DOM size
The DOM size is optimal.
The HTML file has 702 DOM nodes.
Security
HTTPS encryption
The webpage uses HTTPS encryption.
The HTML file has https://www.welivesecurity.com/ DOM nodes.
Mixed content
There are no mixed content resources on the webpage.
Server signature
The webpage does not have a public server signature.
Unsafe cross-origin links
The webpage does not have unsafe cross-origin links.
Plaintext email
The webpage does not contain any plaintext emails.
Miscellaneous
Structured data
The webpage has structured data.
Open Graph
7Twitter
4Schema.org
6
Meta viewport
The webpage has a meta viewport tag set.
width=device-width, initial-scale=1
Character set
The webpage has a charset value set.
utf-8
Sitemap
No sitemaps found.
Social
The webpage has 4 social links.
Facebook
1
Content length
The webpage has 1,650 words.
Text to HTML ratio
The text to HTML ratio is 13%.
Inline CSS
The webpage contains inline CSS code.
Attributes
8display:none;visibility:hidden
background-image: url('/wp-content/uploads/2022/10/domestic-kitten-apt-furball-malware-iran-601x426.jpg'); background-position: 50% 50%;
background-image: url('/wp-content/uploads/2022/10/polonium-apt-group-malware-israel-targeted-601x415.jpg'); background-position: 50% 50%;
background-image: url('/wp-content/uploads/2022/10/eset-threat-report-t2-2022-601x426.jpg'); background-position: 50% 50%;
background-image: url('/wp-content/uploads/2022/09/lazarus-apt-eset-research-amazon-netherlands-belgium-601x415.jpg'); background-position: 50% 50%;
background-image: url('/wp-content/uploads/2022/09/third-party-cookies-blocking-privacy-601x415.jpg'); background-position: 50% 50%;
background-image: url('/wp-content/uploads/2022/11/hidden-cameras-airbnb-601x426.jpg'); background-position: 50% 50%;
background-image: url('/wp-content/uploads/2022/10/trick-or-treat-halloween-cybersecurity-tips-601x426.jpg'); background-position: 50% 50%;
Deprecated HTML
There are no deprecated HTML tags on the webpage.