Login     Sign Up
SEO tool for better search engine rankings, enter URL to generate report
  Home Latest Reports SEO Compare Title/Meta Optimizer   XML Sitemap Generator Whois Lookup Keywords Map Website Directory   Most Backlinks   Most Valuable Most Optimized

threatpost.com favicon Threatpost | The first stop for security news threatpost.com

Excellent Practice36
Improvement Could be Made11
Critical Issues to Attend5
Jul 12, 2020 05:57 AM

Click To Re-generate Current Report

Recommended Actions

  • Create and add a robots.txt for your site.
  • Remove some of the text content and make the text to code ration to be within 15%-70%.
  • Reduce number of links to other pages.
  • Implement HTTP compression for your site.
  • Implement browser caching for your site.
  • Reduce the length of the meta description and ensure it only contains 70 to 160 characters.
  • Add more meta keywords for your page and allows it to contains 10 to 20 words.
  • Use more straight forward terms, avoid using too much jargon in the page content.
  • Add more content and increase the size of your page, make it within 30k-150k bytes.
  • Move the 6 inline css components to an external style sheet file.
  • ...     42
  • Register To View All >>

Detailed Reviews

Related Category
Most related categories of this website.

community   courses   dog   media   multimedia   security   startups   video  

Threatpost | The first stop for security news

Words count: 7    Unique Words: 7    Length: 45 characters
[ To optimize the page title, Use this SEO Title Optimizer ]

Excellent! the title contains 1-12 words, and within 10-70 characters!

The title will be displayed in search engine results in the form of a direct link to the site.

1. ideally, the title should contain 10 to 70 characters, including spaces. (Google displays up to 70 characters in the title, and takes into account only the first 12 words.)
2. put the most important and relevant keywords in the title, try not to repeat any word.
3. each individual page should have a unique title.
Threatpost, is an independent news site which is a leading source of information about IT and business security for hundreds of thousands of professionals worldwide.

Words count: 25    Length: 165 characters
[ To optimize the page description, Use this SEO Meta Description Optimizer ]

The description is too long! It has more than 160 characters

Meta Descriptions provide concise explanations of the contents of web pages, that are commonly used by search engines on search result pages to display preview snippets for a given page.

1. it is best to keep meta descriptions between 70-160 characters.
2. a readable, compelling description using important keywords can draw a much higher click-through rate of searchers to the given web page.
3. avoid keyword stuffing, ensure each page has its own unique description.
Google SERP Preview
Threatpost | The first stop for security news www.threatpost.com/
Threatpost, is an independent news site which is a leading source of information about IT and business security for hundreds of thousands of professionals ...

[ To optimize this Google SERP preview, Use this Google SERP Optimizer ]

This is how your site looks like in Google Search Result Page.

an optimized SERP snippet will have a higher click through rate.

1. make sure the title is clear, simple, straight to the point.
2. make sure the description is relevant and properly summarized the page content.
Hacks, Malware, Vulnerabilities, Web Security, Mobile Security, Privacy

Words count: 8    Length: 71 characters    keyword phrases count : 6

The keywords is too short!
[ To optimize the meta keywords, Use this SEO Meta Keywords Optimizer ]

Keyword Occurrences in Different Sections
Wordkeyword domain title descriptionheadingcontent
1 word:67% (4/6)
hacks 9   (0.59%)
malware 15   (0.98%)
vulnerabilities 5   (0.33%)
privacy 10   (0.65%)
2 words:33% (2/6)
web security 39   (2.55%)
mobile security 43   (2.81%)

Meta keywords should not be ignored, though they are not a major ranking factor for most of search engines nowadays. A Meta keywords tag is supposed to be a brief and concise list of the most important themes of your page

1. keep your list of keywords or keyword phrases down to 10 - 20 unique words or phrases.
2. separate the words or phrases using a comma (you do not need to leave a space between words separated by commas).
3. do not repeat words or phrases.
4. put your most important word or phrases at the beginning of your list.
Keywords Cloud
This keywords cloud gives your an idea of what are those important keywords appears in your website.

android  apps  attacks  breach  cloud  contact  content  cybersecurity  data  december  devices  discuss  google  hacks  insider  july  june  latest  lindsey  malware  march  mobile  news  newsletter  o'donnell  podcast  police  policy  privacy  ransomware  report  researchers  security  sponsored  subscribe  threatpost  threats  trends  vulnerabilities  year 

Top 20 Keywords
Total Terms Count: 1,529

Excellent! No terms has a density of more than 3%, all are optimized to be within 1% - 3%.

Top 20 terms occurance and density
KeywordIn DomainIn TitleIn DescriptionIn Heading In Body Density
security 35 2.29%
july 25 1.64%
news 23 1.50%
threatpost 22 1.44%
malware 15 0.98%
apps 15 0.98%
attacks 14 0.92%
data 10 0.65%
privacy 10 0.65%
june 9 0.59%
content 9 0.59%
sponsored 9 0.59%
hacks 9 0.59%
lindsey 8 0.52%
december 8 0.52%
mobile 8 0.52%
cloud 8 0.52%
discuss 8 0.52%
researchers 7 0.46%
podcast 7 0.46%

keyword density can be used as a factor in determining whether a web page is relevant to a specified keyword or keyword phrase.

1. the optimum keyword density to be 1.0% - 3.0%. Using a keyword more than that could be considered search spam.
2. overuse of keywords, a practice called keyword stuffing, will cause a web page to be penalized.

Excellent! The page is using HTML headings (<H1> - <H6>) and inline emphasis tags (<EM><B><I><EM><STRONG>)




Report: Most Popular Home Routers Have ‘Critical’ Flaws
Microsoft Warns on OAuth Attacks Against Cloud App Users
Joker Android Malware Dupes Its Way Back Onto Google Play
Zoom Zero-Day Allows RCE, Patch on the Way
Android Users Hit with ‘Undeletable’ Adware
Microsoft Releases Emergency Security Updates for Windows 10, Server
CISA: Nation-State Attackers Likely to Take Aim at Palo Alto Networks Bug
REvil Ransomware Gang Adds Auction Feature for Stolen Data
AWS Facial Recognition Platform Misidentified Over 100 Politicians As Criminals
Popular TP-Link Family of Kasa Security Cams Vulnerable to Attack
Google Bans Stalkerware Ads – With a Loophole
Smartwatch Hack Could Trick Dementia Patients into Overdosing
BlueLeaks Server Seized By German Police: Report
‘Undeletable’ Malware Shows Up in Yet Another Android Device
Keeper Threat Group Rakes in $7M from Hundreds of Compromised E-Commerce Sites
BlueLeaks Server Seized By German Police: Report
Zoom Zero-Day Allows RCE, Patch on the Way
Microsoft Seizes Malicious Domains Used in Mass Office 365 Attacks
BEC Hotshot with Opulent Social Media Presence to Face U.S. Charges
AWS Facial Recognition Platform Misidentified Over 100 Politicians As Criminals
Verizon DBIR: Web App Attacks and Security Errors Surge
Katie Moussouris: The Bug Bounty Conflict of Interest
Google Discloses Android Camera Hijack Hack
No ‘Silver Bullet’ Fix for Alexa, Google Smart Speaker Hacks
Trojans, Backdoors and Droppers: The Most-Analyzed Malware
ThreatList: People Know Reusing Passwords Is Dumb, But Still Do It
70 Percent of Mobile, Desktop Apps Contain Open-Source Bugs
ThreatList: Human-Mimicking Bots Spike, Targeting e-Commerce and Travel
ThreatList: Skype-Themed Apps Hide a Raft of Malware
Podcast: Securing Railway Systems Against Hacks
EvilQuest: Inside A ‘New Class’ of Mac Malware
AWS Facial Recognition Platform Misidentified Over 100 Politicians As Criminals
News Wrap: Malicious Chrome Extensions Removed, CIA ‘Woefully Lax’ Security Policies Bashed
Podcast: Would You Use A Contact-Tracing Coronavirus App?
News Wrap: Fake Minneapolis Police Breach, Zoom End-To-End Encryption Debate
Podcast: Why Identity Access Management is the New Perimeter
Verizon DBIR: Web App Attacks and Security Errors Surge
News Wrap: Ransomware Extortion Tactics, Contact-Tracing App Security Worries
BEC Gang Exploits G Suite, Long Domain Names in Cyberattacks
Fake Skype, Signal Apps Used to Spread Surveillanceware
Tokyo Olympics Postponed, But 5G Security Lessons Shine
Cloud Misconfig Mistakes Show Need For DevSecOps
Akamai Talks Massive Uptick in Credential-Stuffing Attacks Against Bank APIs
Chris Eng: Patch Management Challenges Drive ‘Security Debt’
Cobalt Ulster Strikes Again With New ForeLord Malware
Forrester: Keeping Smart Cities Safe From Hacks
Patrick Wardle: Apple Devices Hit With Recycled macOS Malware
2020 Cybersecurity Trends to Watch
Top Mobile Security Stories of 2019
Facebook Security Debacles: 2019 Year in Review
Biggest Malware Threats of 2019
Top 10 IoT Disasters of 2019
2019 Malware Trends to Watch
Top 2018 Security and Privacy Stories
2019: The Year Ahead in Cybersecurity
2018: A Banner Year for Breaches


Subscribe to our Threatpost Today newsletter
Featured news
Editor's Picks
Subscribe to our newsletter, Threatpost Today!
Latest news
Most popular
Newsmaker Interviews
Most Recent ThreatLists
PodcastsView all
VideosView all
SlideshowView all
Subscribe to our newsletter, Threatpost Today!
Infosec Insider Post
Sponsored Content
<EM> (3)Threatpost Today
Threatpost Today
Threatpost Today
<STRONG> (1)Subscribe to our Threatpost Today newsletter

HTML headings and emphasis tags are the most basic forms to indicate important content.

1. use your keywords in the headings and make sure the first level heading (<H1>) includes the most important keywords.
2. never duplicate the title tag content in the heading tags.
3. for more effective SEO, use only one <H1> tag per page
Reading Level

The page text content is a bit too difficult to be read and understood!

Ensure your page content text can be read and understood by most of your site visitors. not too difficult nor too simple.

1. a score below 30, indicates the text content is too difficult to be read and understood.
2. a sore above 80, may suggest that the site is lack of in-depth and expertise of its topics (low quality content).
3. an optimal reading level score shall be 50-70.
en Excellent! the website declared its language in use.

the detected language is : en

Declare the language in use can help search engine to better understand and rendering your page, especially when special characters are encountered.
Page Encoding
utf-8 Excellent! the website declared its character encoding.

Declare the character encoding can help search engine to better rendering your page, especially when it comes to
non-asii characters.
Excellent! the website has a shortcut favicon image.

https://threatpost.com/home/feed/ Excellent! the website has a RSS (Really Simple Syndication) Feed for quick publishing.

Robots.txt is not presented for the site.

Robots.txt file can be used to regulate access of search engine crawlers, properly configured robots.txt file can help
crawlers to better understand your website.

1. grand robots access to those pages you wish them to crawl.
2. restrict access to those pages you do not wish search engines to see and crawl.
XML Sitemap
http://threatpost.com/sitemap.xml Excellent! the website has a XML Sitemap to guide search engine crawlers for indexing its pages.
[ To generate XML sitemap, Use this XML Sitemap Generator ]

Sitemap helps search engine crawler to identify your website pages.

1. ensure all your important pages are listed in the sitemap.
2. ensure to indicate the frequency of change and importance of each url.
3. inform search engines of the location/URL of your sitemap (eg, For Google, you can set the website sitemap location through Google Webmaster management panel).
Loading Time
0.01 seconds - 2,546.00 Kb/s

Excellent! the site is pretty fast and it takes less than 1 second to load.

Estimated loading time for different internet connections
Optical Fibre
3.64 s 0.03 s 0.03 s 0.01 s 2.04 ms

Site speed is becoming an crucial ranking factor. Slow page loading is one of the biggest complains of web users. If the loading time is too long, you may need to check your server, network, or system codes and structure.

1. ideal loading time is less than 1 seconds, if it take more than 5 seconds to load your site, likely users will run out of patience, so do search engines.
2. improve your SEO by optimizing your website to have a small size and faster responding server.
Total Size
25 Kb (25,460 bytes)

The page is a bit too small, it may not have enough relevant content to rank well!

Page size affects the speed of your website.

1. try to keep you page size between 30K-150K
2. put javascript and style sheet in separate files, and link them to the main page.
3. use optimized images for web and set up your server with gzip for downloading
Text To Code Ratio
Total Size Text Size HTML Code Size Text/HTML Code Ratio
25 Kb (25,460 bytes) 13 Kb (12,865 bytes) 13 Kb (12,595 bytes) 102.14 %

The Text/HTML Code Ratio is a bit too high, it might be considered as spam by search engines.

the ratio of text to HTML code should always be above 15% for good SEO gain,
it is below 15% then that means that your website probably needs more text content.

1. a ratio between 25% and 70% is ideal, when it goes beyond than that, the page might run the risk of being considered as spam. As long as the content is relevant and gives essential information, it is a plus point to have more of it.
2. improve your SEO by adding more relevant text to your pages and also increasing your keyword density.
Excellent! No flash component is detected on this page.

Flash content can not be properly indexed by search engines, and normally flash file is large in size, which slow down the loading of your page.

1. avoid flash content whenever possible if you wish to have a fast and SEO friendly website.
Excellent! No frame is detected on this page.

Framesets and individual frames could cause problem for search engine to crawl your pages

1. avoid frames whenever possible.
2. search engines do not like frames.
3. use iframe instead if you really have no choice.
Inline CSS
6 Inline CSS components are detected on this page.

It is a good practice to move inline CSS rules into an external CSS file in order to make your page lighter and increasing the text to code ratio.

1. move inline css rules to external css file.
2. separate style from html.
Nested Table
Excellent! No nested table is detected on this page (nested table : 0, total table : 0)

nested tables could slow down page rendering and lead to bad user experience.

1. avoiding <table> for your page layout.
2. using <div> instead of <table>.
Plain Text Email
Excellent! No Plain Text Email is detected on this page.

Redirect Count
1 redirection was detected for loading this page.

Excellent! HTTPS is used for your page.

WWW Resolve
Excellent! the websites http://www.threatpost.com and http://threatpost.com are resolved to the same url :https://threatpost.com/

Search Engines treat URLs with or without "www" as two different records.

1. edit your .htaccess file and permanently redirect one to the other (eg redirect www.mysite.com to mysite.com).
IP Canonicalization
Excellent! IP address of the site is forwarded to its domain name site https://threatpost.com/.

URL Rewrite
Excellent! your urls are clean.

clean, short and relevant URLs are favoured by users and search engines

1. use url rewrite to turn dynamic pages with query parameters into seo friendly static pages.
2. put your important keywords in the url.
3. good urls are not only user friendly but also seo friendly.
Underscore In URL
URLs with underscore

You have 2 Urls with underscore.

Search Engines treat hyphen as word separator, they do not treat underscore as word separator.

1. use hyphen "-" instead of underscore "_" to optimize your page url.
2. help search engines to better understand your url, eventually will benefit your page`s ranking.
Internal Links
(link to pages within this domain)
External Links
(link to pages on other websites)
230 25 255

Too many links (255), it may be considered as spam!

Internal Links (link to pages within this domain) - 230
URL Anchor Text
https://threatpost.com/web-privacy-policy/privacy policy
https://threatpost.com/web-privacy-policy/privacy policy
https://threatpost.com/category/cloud-security/Cloud Security
https://threatpost.com/waterfall/Waterfall Security Spotlight
https://threatpost.com/repo...uters-have-critical-flaws/157346/Report: Most Popular Home Rout...
https://threatpost.com/author/elizabethmontalbano/Elizabeth Montalbano
https://threatpost.com/micr...s-oauth-attacks-cloud-app/157331/Microsoft Warns on OAuth Attac...
https://threatpost.com/author/sealstara/Tara Seals
https://threatpost.com/author/sealstara/Tara Seals
https://threatpost.com/joke...way-back-onto-google-play/157307/Joker Android Malware Dupes It...
https://threatpost.com/author/lindseyodonnell/Lindsey O'Donnell
https://threatpost.com/unpatched-zoom-bug-rce/157317/Zoom Zero-Day Allows RCE, Patc...
https://threatpost.com/author/sealstara/Tara Seals
https://threatpost.com/andr...-users-undeletable-adware/157189/Android Users Hit with ‘Undele...
https://threatpost.com/micr...tes-for-windows-10-server/157055/Microsoft Releases Emergency S...
https://threatpost.com/cisa...rs-palo-alto-networks-bug/157013/CISA: Nation-State Attackers L...
https://threatpost.com/revi...-gang-auction-stolen-data/157006/REvil Ransomware Gang Adds Auc...
https://threatpost.com/aws-...-politicians-as-criminals/156984/AWS Facial Recognition Platfor...
http://threatpost.com/#modal_newsletterSubscribe now
https://threatpost.com/popu...cams-vulnerable-to-attack/157371/Popular TP-Link Family of Kasa...
https://threatpost.com/author/thomas/Tom Spring
https://threatpost.com/author/thomas/Tom Spring
https://threatpost.com/goog...rware-ads-with-a-loophole/157365/Google Bans Stalkerware Ads – ...
https://threatpost.com/author/lindseyodonnell/Lindsey O'Donnell
https://threatpost.com/author/lindseyodonnell/Lindsey O'Donnell
https://threatpost.com/smar...-patients-into-overdosing/157352/Smartwatch Hack Could Trick De...
https://threatpost.com/author/lindseyodonnell/Lindsey O'Donnell
https://threatpost.com/author/lindseyodonnell/Lindsey O'Donnell
https://threatpost.com/blue...d-by-german-police-report/157288/BlueLeaks Server Seized By Ger...
https://threatpost.com/author/lindseyodonnell/Lindsey O'Donnell
https://threatpost.com/author/lindseyodonnell/Lindsey O'Donnell
https://threatpost.com/unde...et-another-android-device/157289/‘Undeletable’ Malware Shows Up...
https://threatpost.com/author/elizabethmontalbano/Elizabeth Montalbano
https://threatpost.com/author/elizabethmontalbano/Elizabeth Montalbano
https://threatpost.com/keep...group-7m-e-commerce-sites/157235/Keeper Threat Group Rakes in $...
https://threatpost.com/blue...d-by-german-police-report/157288/BlueLeaks Server Seized By Ger...
https://threatpost.com/unpatched-zoom-bug-rce/157317/Zoom Zero-Day Allows RCE, Patc...
https://threatpost.com/micr...-office-365-phishing-scam/157261/Microsoft Seizes Malicious Dom...
https://threatpost.com/bec-...t-social-media-us-charges/157245/BEC Hotshot with Opulent Socia...
https://threatpost.com/aws-...-politicians-as-criminals/156984/AWS Facial Recognition Platfor...
https://threatpost.com/veri...and-security-errors-surge/155903/Verizon DBIR: Web App Attacks ...
https://threatpost.com/kati...unty-conflict-of-interest/152819/Katie Moussouris: The Bug Boun...
https://threatpost.com/goog...ndroid-camera-hijack-hack/150409/Google Discloses Android Camer...
https://threatpost.com/no-s...oogle-smart-speaker-hacks/149427/No ‘Silver Bullet’ Fix for Ale...
https://threatpost.com/troj...ers-most-analyzed-malware/157134/Trojans, Backdoors and Dropper...
https://threatpost.com/thre...s-is-dumb-but-still-do-it/155996/ThreatList: People Know Reusin...
https://threatpost.com/70-of-apps-open-source-bugs/156040/70 Percent of Mobile, Desktop ...
https://threatpost.com/thre...ike-e-commerce-and-travel/155302/ThreatList: Human-Mimicking Bo...
https://threatpost.com/skype-apps-hide-malware/154566/ThreatList: Skype-Themed Apps ...
https://threatpost.com/category/podcasts/PodcastsView all
https://threatpost.com/podc...way-systems-against-hacks/157149/Podcast: Securing Railway Syst...

External Links (link to pages on other websites) - 25
URL Anchor Text
https://indd.adobe.com/view...79c19-a6ca-4cb0-8106-ed4d5d02a292Advertise With Us

reasonable number of links (below 100) per page will give a better user experience.

1. keep the number of links per page below 100.
2. having more than 100 links in a single page will lead to a bad user experience, and it possibly runs into the risk of been considered as spam.
3. search engines may not follow all the links if you have too many of them in a single page.
Total Images Alt Present Alt Missing
56 32 24

24 images do not have Alt values.

Image URL - 56
https://media.threatpost.co.../uploads/sites/103/2020/07/09165026/oauth-540x270.pngmicrosoft warns on oauth attac...
https://media.threatpost.co.../sites/103/2020/07/09112156/Joker-malware-540x270.jpgjoker malware google play
https://media.threatpost.co.../09130756/zoom-security-ten-tips-featured-540x270.jpgzoom zero-day rce
https://media.threatpost.co...tent/uploads/sites/103/2018/12/21152821/54-64x64.jpegAPT FruityArmor and SandCat
https://media.threatpost.co...es/103/2019/08/14145757/biometrics-privacy-64x64.jpegbiometrics data breach
https://media.threatpost.co...sites/103/2020/07/10110418/smartwatch-pil-540x270.jpgsmartwatch pill
https://media.threatpost.co...tes/103/2020/01/07125921/google-security-540x270.jpegpre-installed malware undeleta...
https://media.threatpost.co...ploads/sites/103/2020/04/02090859/ecommerce-64x64.jpgkeeper magecart e-commerce att...
https://media.threatpost.co...07/09130756/zoom-security-ten-tips-featured-64x64.jpgzoom zero-day rce
https://media.threatpost.co...loads/sites/103/2020/07/08100143/office-365-64x64.jpgmicrosoft seizes covid-19 phis...
https://media.threatpost.co...oads/sites/103/2019/12/24125214/BEC_700_420-64x64.pngAbbas BEC arrest extradition
https://media.threatpost.co...es/103/2019/08/14145757/biometrics-privacy-64x64.jpegbiometrics data breach
https://media.threatpost.co...03/2019/11/19123051/smartphone-camera-hack-64x64.jpegsmartphone camera hack
https://media.threatpost.co...s/sites/103/2020/01/22100148/trojan-malware-64x64.jpgmost-analyzed malware
https://media.threatpost.co...ds/sites/103/2014/07/07015644/codes-n-stuff-64x64.pngsel4 open source microkernel
https://media.threatpost.co...03/2020/04/29122011/abstract-robot-thinking-64x64.jpgbad bot activity internet
https://media.threatpost.co...tes/103/2020/04/08122241/skype-for-business-64x64.jpgskype hides malware
https://media.threatpost.co...ploads/sites/103/2020/07/06094902/Railway-540x270.jpgRailway system
https://media.threatpost.co...ds/sites/103/2020/07/01143018/Mac-Malware-540x270.jpgevilquest mac malware
https://media.threatpost.co.../103/2019/08/14145757/biometrics-privacy-540x270.jpegbiometrics data breach
https://media.threatpost.co...tes/103/2019/10/17164730/insider-threat-2-540x270.jpginsider threat
https://media.threatpost.co...s/sites/103/2020/03/17170948/coronavirus1-540x270.jpgcontact tracing apps covid 19
https://media.threatpost.co...sites/103/2020/04/30081507/Ransomware-Key-540x270.jpgthreatpost news wrap
https://media.threatpost.co...sites/103/2020/03/09191149/insecure-cloud-540x270.jpgryan olson palo alto unit 42
https://media.threatpost.co...tes/103/2019/03/11152945/Iran-APT-Hacking-540x270.jpgIranian us cyberattack
https://media.threatpost.co...03/2018/08/09130724/AdobeStock_128568737-540x270.jpegsmart city security
https://media.threatpost.co...sites/103/2019/12/19132619/slideshow-fb-1-540x270.pngfacebook security privacy
https://media.threatpost.co.../103/2019/12/18105739/IoT-2019-disastors--540x270.pngIoT security disasters
https://media.threatpost.co...ploads/sites/103/2018/12/11133718/malware-540x270.jpgcobalt malware threadkit

search engines cannot `see` images, proper Alt content will help them to better understand and index images.

1. always add alt attributes to images. Alt is mandatory for accessibility and for valid XHTML.
2. words used within an image`s Alt attribute should be its text equivalent and convey the same information.
3. use a human-readable caption and descriptive text around the image.
Style Block In Same Page Links to External Style Files Total
0 1 1

Excellent! all stylesheets are kept in separate files.

Links To External Stylesheet Files - 1
Stylesheet URL rel type

Scripts Block In Same Page Links to External Script Files Total
36 17 53

Too many (17) external scripts files , it will slow down the downlaoding.

Links To External Script Files - 17
Script URL Type

put scripts together and link them from an external files rather then put them in the same file as the main page.

1. reduce the use of in-page scripts, put them in separate files and link them in.
2. reduce the number of external script files, it will help browser to make lesser number of http requests from the server.
3. optimize or compress the script files to have smaller size and faster loading.
Blog Or News Release
Link to Blog / News Release Page
http://threatpost.com/#modal_newsletterSubscribe now

Excellent! we have found blog linked to your site.

Having a blog is a great way to provide fresh content and retain users, search engines favour it too.

1. regularly update your blog and provide fresh and quality content.
2. relevant blogs of your website topics, generate more credits in the eyes of your visitors, as well as search engines.
DMOZ Listing

Your site is not listed in the DMOZ Open Directory. DMOZ Open Directory Project

Google Analytics
Analytics Service is not implemented for the site.

Google Page Rank
6 Excellent! the website has a high page rank (6/10).

0 - 1 2 - 3 4 - 10
Poor Good Excellent
Links From Root Domains
Excellent! You do have a lot of root domains (62) linked to your site threatpost.com.

< 20 21 - 50 > 51
Poor Good Excellent

Number of backlinks from some other root domains is an indicator of domain authority, the more backlinks your site has, the higher its domain authority, which leads to a higher chance of better ranking.

1. make it easy for others to link to your site, provide the code if possible.
2. links from older domains are more powerful than links from new domains.
3. links from .edu and .gov generally have a higher value.
Social Engagement
Your site has an excellent social media engagement!

  Facebook Likes 10
  Facebook Shares 84
  Facebook Comments 28
  Tweets 835
  LinkedIn 0

Social Media Integration
Excellent! your site is well integrated with social media networks.

Facebook Pagehttps://www.facebook.com/Threatpost/
Twitter Accounthttps://twitter.com/threatpost/
Google+ PageNot Found


Excellent! the website has a good Trustworthiness Score (93/100).

0 - 19 20 - 39 40 - 59 60 - 79 80 - 100
Very Poor Poor Unsatisfactory Good Excellent

Users are concerned about the safety of their online transactions. Trustworthiness rating is based on real user ratings and that tells you how much other users trust this site, so do the serch engines. note: this trustworthiness score is provided by WOT (Web of Trust).

1. pay attention to the look and design of your site, many people look for visual cues when assessing a site`s credibility
2. make your site easy to use, sites that are easy to navigate are perceived as being more trustworthy.
3. make it easy for user to contact you, users will be more comfortable and feel more secured shall they need to get in touch with you.
Child Safe
93 Excellent! the website has a good Child Safe Score (93/100).

0 - 19 20 - 39 40 - 59 60 - 79 80 - 100
Very Poor Poor Unsatisfactory Good Excellent

Safe Browsing
Safe! the site threatpost.com is NOT currently listed as suspicious, most-likely it is clean from malware and phining code [ verify this by Google Safe Browsing ]

Ensure that your site is malware free and does not cause harm to users` computers.

1. do not put virus, malicious worms, adwares, trojans, spywares and suspicious phishing code in your server.
2. take suspicious behaviours seriously, have a regular check-up and monitor closely of your server`s log files.
3. if your site is black-listed by Google as suspicious, clean it up before requesting for a review.
Traffic Rank
43,552th most visited website in the world.
18,829th most visited website in United States  

your site has an excellent high traffic rank in the world.
Websites On Same Server
Excellent! You do have very few domains (4 - securelist.com, threatpost.com, securelist.ru, securelist.fr) hosted on the same server as threatpost.com (ip :

Too many domains hosted on the same server is an indicator that you are not really serious about your website, and your site will have a higher chance to be surrounded by bad neighbours.

1. the fewer domains hosted on the same server/ip the better.
2. avoid shared hosting whenever possible, especially when there are already hundreds or thousands of sites are hosted on the same server.
3. dedicated ip or resources for your site not only do good to your site visitors but also favoured by search engines.
Server Location
your server (IP : is located at United States  
the most site visitors come from United States  

Excellent! your server is located close to most of your site visitors.
HTTP Compression

your website server does not support HTTP Compression.


your website server does not support Caching.

Server Signature
Excellent! the website server signature is off.

A secure and safe server is not only good for your site visitors but also good for search engines.

1. server software version information can be utilized by malicious visitors to attack your server.
2. by turning off the server signature, you actually have made your server a little bit more secure.
3. for Apache server - edit the apache2.conf or the .htaccess file to turn server signature off.
Domain Age
11 years, 201 days old ( 1st registered on : 2008-12-23 )

[ To check the detailed whois info, Use this Whois Lookup Tool ]

excellent, the domain age is old enough.

Domain Expires
1 year, 163 days from today ( expires on : 2021-12-23 )

[ To check the detailed whois info, Use this Whois Lookup Tool ]

domain is expiring soon.

Domain Info
threatpost.com ( 14 characters )

Domain Registrar : MarkMonitor Inc.

[ To check the detailed whois info, Use this Whois Lookup Tool ]

Domain Created On Last Modified On Expires On
2008-12-23 2019-11-21 2021-12-23
11 years, 201 days old 0 years, 234 days ago 1 year, 163 days from today
11 years, 201 days old

Domain Name Servers used by threatpost.com
DNS Name IP Address

You have a nice choice of domain name, which is of a right length (14 characters).

domain name choice and domain age are crucial for SEO.

1. keep the domain name short and relevant to the content, which will be easier to be remembered and related to.
2. older domain tends to be more trustworthy.
3. register a domain for more than 1 year, and search engine will think it is a serious business.


Generating Report ......

Completed 0 of 30 tasks in generating the seo report!

"SEO Tools to Audit Websites for Improving Search Engine Rankings."

Language Detection   |   Language Statistics   |   Directory Sponsor

HP Terms of use   |   News   |   FAQ   |   Contact Us

copyright © 2011-2020 seocert.net, all rights reserved