Login     Sign Up
SEO tool for better search engine rankings, enter URL to generate report
Home Latest Reports SEO Compare Title Optimizer Sitemap Generator Keywords Map Web Directory Most Backlinks Most Value

threatpost.com favicon threatpost.com

Excellent Practice35
Improvement Could be Made11
Critical Issues to Attend5
Nov 14, 2019 03:10 PM

Click To Re-generate Current Report

Recommended Actions

  • Remove some of the text content and make the text to code ration to be within 15%-70%.
  • Reduce number of links to other pages.
  • Implement HTTP compression for your site.
  • Implement browser caching for your site.
  • Extend the registration of your domain for a longer period.
  • Reduce the length of the meta description and ensure it only contains 70 to 160 characters.
  • Add more meta keywords for your page and allows it to contains 10 to 20 words.
  • Use more straight forward terms, avoid using too much jargon in the page content.
  • Add more content and increase the size of your page, make it within 30k-150k bytes.
  • Move the 6 inline css components to an external style sheet file.
  • ...     48
  • Register To View All >>

Detailed Reviews

Related Category
Most related categories of this website.

advertising   apps   art   comics   courses   media   social   video  

Threatpost | The first stop for security news

Words count: 7    Unique Words: 7    Length: 45 characters
[ To optimize the page title, Use this SEO Title Optimizer ]

Excellent! the title contains 1-12 words, and within 10-70 characters!

The title will be displayed in search engine results in the form of a direct link to the site.

1. ideally, the title should contain 10 to 70 characters, including spaces. (Google displays up to 70 characters in the title, and takes into account only the first 12 words.)
2. put the most important and relevant keywords in the title, try not to repeat any word.
3. each individual page should have a unique title.
Threatpost, is an independent news site which is a leading source of information about IT and business security for hundreds of thousands of professionals worldwide.

Words count: 25    Length: 165 characters
[ To optimize the page description, Use this SEO Meta Description Optimizer ]

The description is too long! It has more than 160 characters

Meta Descriptions provide concise explanations of the contents of web pages, that are commonly used by search engines on search result pages to display preview snippets for a given page.

1. it is best to keep meta descriptions between 70-160 characters.
2. a readable, compelling description using important keywords can draw a much higher click-through rate of searchers to the given web page.
3. avoid keyword stuffing, ensure each page has its own unique description.
Google SERP Preview
Threatpost | The first stop for security news www.threatpost.com/
Threatpost, is an independent news site which is a leading source of information about IT and business security for hundreds of thousands of professionals ...

[ To optimize this Google SERP preview, Use this Google SERP Optimizer ]

This is how your site looks like in Google Search Result Page.

an optimized SERP snippet will have a higher click through rate.

1. make sure the title is clear, simple, straight to the point.
2. make sure the description is relevant and properly summarized the page content.
Hacks, Malware, Vulnerabilities, Web Security, Mobile Security, Privacy

Words count: 8    Length: 71 characters    keyword phrases count : 6

The keywords is too short!
[ To optimize the meta keywords, Use this SEO Meta Keywords Optimizer ]

Keyword Occurrences in Different Sections
Wordkeyword domain title descriptionheadingcontent
1 word:67% (4/6)
hacks 0   (0%)
malware 0   (0%)
vulnerabilities 0   (0%)
privacy 0   (0%)
2 words:33% (2/6)
web security 0   (0%)
mobile security 0   (0%)

Meta keywords should not be ignored, though they are not a major ranking factor for most of search engines nowadays. A Meta keywords tag is supposed to be a brief and concise list of the most important themes of your page

1. keep your list of keywords or keyword phrases down to 10 - 20 unique words or phrases.
2. separate the words or phrases using a comma (you do not need to leave a space between words separated by commas).
3. do not repeat words or phrases.
4. put your most important word or phrases at the beginning of your list.
Keywords Cloud
This keywords cloud gives your an idea of what are those important keywords appears in your website.

apt  attacks  breaches  breaking  cloud  content  cybersecurity  data  deliver  discusses  expert  google  hacks  infosec  insider  iot  latest  malware  mobile  news  newsletter  november  october  personal  podcasts  privacy  regulation  seals  security  sponsored  subscribe  tara  threatlist  threatpost  threats  trends  video  vulnerabilities  week  year 

Top 20 Keywords
Total Terms Count: 1,540

Excellent! No terms has a density of more than 3%, all are optimized to be within 1% - 3%.

Top 20 terms occurance and density
KeywordIn DomainIn TitleIn DescriptionIn Heading In Body Density
security 34 2.21%
november 30 1.95%
threatpost 23 1.49%
news 20 1.30%
insider 16 1.04%
privacy 16 1.04%
data 15 0.97%
threats 14 0.91%
malware 12 0.78%
hacks 11 0.71%
attacks 11 0.71%
october 10 0.65%
expert 9 0.58%
sponsored 9 0.58%
content 9 0.58%
tara 7 0.45%
discusses 7 0.45%
vulnerabilities 7 0.45%
seals 7 0.45%
mobile 7 0.45%

keyword density can be used as a factor in determining whether a web page is relevant to a specified keyword or keyword phrase.

1. the optimum keyword density to be 1.0% - 3.0%. Using a keyword more than that could be considered search spam.
2. overuse of keywords, a practice called keyword stuffing, will cause a web page to be penalized.

Excellent! The page is using HTML headings (<H1> - <H6>) and inline emphasis tags (<EM><B><I><EM><STRONG>)




Just-Released Checkra1n iPhone Jailbreak Stirs Security Concerns
Innovative PureLocker Ransomware Emerges in Targeted Attacks
Threat Actor Impersonates USPS to Deliver Backdoor Malware
ENFUSE 2019: Security Regulations, Insider Threats, and IoT Privacy Risks
Microsoft Patches RCE Bug Actively Under Attack
Plugging the Data Leak in Manufacturing
DDoS Attacks Target Amazon, SoftLayer and Telecom Infrastructure
Understanding the Ripple Effect: Large Enterprise Data Breaches Threaten Everyone
Art Imitates Life: Lessons from the Final Season of Mr. Robot
Double Vision: Stealthy Malware Dropper Delivers Dual RATs
California’s Domino Effect on U.S. Privacy Regulation
Website, Know Thyself: What Code Are You Serving?
APT33 Mounts Focused, Highly Targeted Botnet Attacks Against U.S. Victims
Download: The Comprehensive Compliance Guide
Adobe Patches Critical Bugs in Illustrator, Media Encoder
Insider Threats, a Cybercriminal Favorite, Not Easy to Mitigate
IoT Security Woes Plague Healthcare Industry
Plugging the Data Leak in Manufacturing
Google Enlists Help to Fight Bad Android Apps
No ‘Silver Bullet’ Fix for Alexa, Google Smart Speaker Hacks
Marc Rogers: Success of Anonymous Bug Submission Program ‘Takes A Village’
Thousands of IoT Devices Bricked By Silex Malware
Newsmaker Interview: Bruce Schneier on Physical Cyber Threats
Newsmaker Interview: Troy Mursch on Top Botnet Trends
ThreatList: Most Retail Hardware Bug Bounty Flaws Are Critical
ThreatList: Sharp Increase in Fake Mobile Apps Impersonating Legit Ones
ThreatList: Google’s Advertising Network Dominates Global Data Collection
ThreatList: Apple Adware, Phishing, APT Attacks Threaten macOS Users
ThreatList: Police Use of Facial Recognition is Just Fine, Say Most Americans
ENFUSE 2019: Security Regulations, Insider Threats, and IoT Privacy Risks
News Wrap: Voice Assistant Laser Hack, Twitter Insider Threats, Data Breach Fine Fails
Emotet Resurgence Continues With New Tactics, Techniques and Procedures
News Wrap: APTs, Office 365 Voicemail Phish and Bed Bath & Beyond Breach
WhatsApp Spyware Attack: Uncovering NSO Group Activity
News Wrap: Hotel Robot Hacks, FTC Stalkerware Crackdown
No ‘Silver Bullet’ Fix for Alexa, Google Smart Speaker Hacks
Podcast: Insider Attacks May Soon Cost Less Than Malware-based Equivalent
Podcast: Departing Employees Could Mean Departing Data
California’s Domino Effect on U.S. Privacy Regulation
Post-GandCrab, Cybercriminals Scouring the Dark Web for the Next Top Ransomware
Election Security Threats: From Misinformation to Voting Machine Flaws
Security Vulnerabilities Are Increasingly Putting Kids at Risk
Data Security in the Cloud: How to Lock Down the Next-Gen Perimeter
Hackers Take Over IoT Devices to ‘Click’ on Ads
Lax Telco Security Allows Mobile Phone Hijacking and Redirects
Post-Perimeter Security: Addressing Evolving Mobile Enterprise Threats
Insider Threats Get Mean, Nasty and Very Personal
2019 Malware Trends to Watch
Top 2018 Security and Privacy Stories
2019: The Year Ahead in Cybersecurity
2018: A Banner Year for Breaches
Slideshow: Intel from Virus Bulletin 2018
Slideshow: Scenes from Black Hat USA 2013
More from CanSecWest 2013
Ryan McGeehan and Chad Greene
Stefan Esser


Subscribe to our Threatpost Today newsletter
Featured news
Editor's Picks
Subscribe to our newsletter, Threatpost Today!
Latest news
Most popular
Newsmaker Interviews
Most Recent ThreatLists
PodcastsView all
VideosView all
SlideshowView all
Subscribe to our newsletter, Threatpost Today!
Infosec Insider Post
Sponsored Content
<EM> (3)Threatpost Today
Threatpost Today
Threatpost Today
<STRONG> (1)Subscribe to our Threatpost Today newsletter

HTML headings and emphasis tags are the most basic forms to indicate important content.

1. use your keywords in the headings and make sure the first level heading (<H1>) includes the most important keywords.
2. never duplicate the title tag content in the heading tags.
3. for more effective SEO, use only one <H1> tag per page
Reading Level

The page text content is a bit too difficult to be read and understood!

Ensure your page content text can be read and understood by most of your site visitors. not too difficult nor too simple.

1. a score below 30, indicates the text content is too difficult to be read and understood.
2. a sore above 80, may suggest that the site is lack of in-depth and expertise of its topics (low quality content).
3. an optimal reading level score shall be 50-70.
en Excellent! the website declared its language in use.

the detected language is : en

Declare the language in use can help search engine to better understand and rendering your page, especially when special characters are encountered.
Page Encoding
utf-8 Excellent! the website declared its character encoding.

Declare the character encoding can help search engine to better rendering your page, especially when it comes to
non-asii characters.
Excellent! the website has a shortcut favicon image.

https://threatpost.com/home/feed/ Excellent! the website has a RSS (Really Simple Syndication) Feed for quick publishing.

http://threatpost.com/robots.txt Excellent! the website has a Robots.txt file to regulate search engine crawlers access.

Robots.txt file can be used to regulate access of search engine crawlers, properly configured robots.txt file can help
crawlers to better understand your website.

1. grand robots access to those pages you wish them to crawl.
2. restrict access to those pages you do not wish search engines to see and crawl.
XML Sitemap
http://threatpost.com/sitemap.xml Excellent! the website has a XML Sitemap to guide search engine crawlers for indexing its pages.
[ To generate XML sitemap, Use this XML Sitemap Generator ]

Sitemap helps search engine crawler to identify your website pages.

1. ensure all your important pages are listed in the sitemap.
2. ensure to indicate the frequency of change and importance of each url.
3. inform search engines of the location/URL of your sitemap (eg, For Google, you can set the website sitemap location through Google Webmaster management panel).
Loading Time
0.01 seconds - 2,532.90 Kb/s

Excellent! the site is pretty fast and it takes less than 1 second to load.

Estimated loading time for different internet connections
Optical Fibre
3.62 s 0.03 s 0.03 s 0.01 s 2.03 ms

Site speed is becoming an crucial ranking factor. Slow page loading is one of the biggest complains of web users. If the loading time is too long, you may need to check your server, network, or system codes and structure.

1. ideal loading time is less than 1 seconds, if it take more than 5 seconds to load your site, likely users will run out of patience, so do search engines.
2. improve your SEO by optimizing your website to have a small size and faster responding server.
Total Size
25 Kb (25,329 bytes)

The page is a bit too small, it may not have enough relevant content to rank well!

Page size affects the speed of your website.

1. try to keep you page size between 30K-150K
2. put javascript and style sheet in separate files, and link them to the main page.
3. use optimized images for web and set up your server with gzip for downloading
Text To Code Ratio
Total Size Text Size HTML Code Size Text/HTML Code Ratio
25 Kb (25,329 bytes) 13 Kb (12,942 bytes) 12 Kb (12,387 bytes) 104.48 %

The Text/HTML Code Ratio is a bit too high, it might be considered as spam by search engines.

the ratio of text to HTML code should always be above 15% for good SEO gain,
it is below 15% then that means that your website probably needs more text content.

1. a ratio between 25% and 70% is ideal, when it goes beyond than that, the page might run the risk of being considered as spam. As long as the content is relevant and gives essential information, it is a plus point to have more of it.
2. improve your SEO by adding more relevant text to your pages and also increasing your keyword density.
Excellent! No flash component is detected on this page.

Flash content can not be properly indexed by search engines, and normally flash file is large in size, which slow down the loading of your page.

1. avoid flash content whenever possible if you wish to have a fast and SEO friendly website.
Excellent! No frame is detected on this page.

Framesets and individual frames could cause problem for search engine to crawl your pages

1. avoid frames whenever possible.
2. search engines do not like frames.
3. use iframe instead if you really have no choice.
Inline CSS
6 Inline CSS components are detected on this page.

It is a good practice to move inline CSS rules into an external CSS file in order to make your page lighter and increasing the text to code ratio.

1. move inline css rules to external css file.
2. separate style from html.
Nested Table
Excellent! No nested table is detected on this page (nested table : 0, total table : 0)

nested tables could slow down page rendering and lead to bad user experience.

1. avoiding <table> for your page layout.
2. using <div> instead of <table>.
Plain Text Email
Excellent! No Plain Text Email is detected on this page.

Redirect Count
1 redirection was detected for loading this page.

Excellent! HTTPS is used for your page.

WWW Resolve
Excellent! the websites http://www.threatpost.com and http://threatpost.com are resolved to the same url :https://threatpost.com/

Search Engines treat URLs with or without "www" as two different records.

1. edit your .htaccess file and permanently redirect one to the other (eg redirect www.mysite.com to mysite.com).
URL Rewrite
Excellent! your urls are clean.

clean, short and relevant URLs are favoured by users and search engines

1. use url rewrite to turn dynamic pages with query parameters into seo friendly static pages.
2. put your important keywords in the url.
3. good urls are not only user friendly but also seo friendly.
Underscore In URL
URLs with underscore

You have 6 Urls with underscore.

Search Engines treat hyphen as word separator, they do not treat underscore as word separator.

1. use hyphen "-" instead of underscore "_" to optimize your page url.
2. help search engines to better understand your url, eventually will benefit your page`s ranking.
Internal Links
(link to pages within this domain)
External Links
(link to pages on other websites)
218 25 243

Too many links (243), it may be considered as spam!

Internal Links (link to pages within this domain) - 218
URL Anchor Text
https://threatpost.com/web-privacy-policy/privacy policy
https://threatpost.com/web-privacy-policy/privacy policy
https://threatpost.com/category/cloud-security/Cloud Security
https://threatpost.com/microsite/infosec-insiders-community/InfoSec Insider
https://threatpost.com/chec...-jailbreak-stirs-concerns/150182/Just-Released Checkra1n iPhone...
https://threatpost.com/author/thomas/Tom Spring
https://threatpost.com/pure...nsomware-targeted-attacks/150229/Innovative PureLocker Ransomwa...
https://threatpost.com/author/sealstara/Tara Seals
https://threatpost.com/author/sealstara/Tara Seals
https://threatpost.com/thre...impersonates-usps-malware/150242/Threat Actor Impersonates USPS...
https://threatpost.com/author/sealstara/Tara Seals
https://threatpost.com/enfu...ats-and-iot-privacy-risks/150231/ENFUSE 2019: Security Regulati...
https://threatpost.com/author/lindseyodonnell/Lindsey O'Donnell
https://threatpost.com/microsoft-patches-rce-bug/150136/Microsoft Patches RCE Bug Acti...
https://threatpost.com/plug...g-data-leak-manufacturing/150132/Plugging the Data Leak in Manu...
https://threatpost.com/mass...on-telecom-infrastructure/150096/DDoS Attacks Target Amazon, So...
https://threatpost.com/ripp...-enterprise-data-breaches/150041/Understanding the Ripple Effec...
https://threatpost.com/lessons-final-season-mr-robot/150049/Art Imitates Life: Lessons fro...
http://threatpost.com/#modal_newsletterSubscribe now
https://threatpost.com/malware-dropper-dual-rats/150271/Double Vision: Stealthy Malwar...
https://threatpost.com/author/sealstara/Tara Seals
https://threatpost.com/author/sealstara/Tara Seals
https://threatpost.com/ccpa...ect-us-privacy-regulation/150246/California’s Domino Effect on ...
https://threatpost.com/author/lindseyodonnell/Lindsey O'Donnell
https://threatpost.com/author/lindseyodonnell/Lindsey O'Donnell
https://threatpost.com/webs...what-code-are-you-serving/150257/Website, Know Thyself: What Co...
http://threatpost.com/#modal_infosec_descInfoSec Insider
http://threatpost.com/#modal_infosec_descInfoSec Insider
https://threatpost.com/apt3...argeted-botnet-attacks-us/150248/APT33 Mounts Focused, Highly T...
https://threatpost.com/author/sealstara/Tara Seals
https://threatpost.com/author/sealstara/Tara Seals
https://threatpost.com/down...ehensive-compliance-guide/150180/Download: The Comprehensive Co...
http://threatpost.com/#modal_sponsored_descSponsored Content
http://threatpost.com/#modal_sponsored_descSponsored Content
https://threatpost.com/adob...illustrator-media-encoder/150114/Adobe Patches Critical Bugs in...
https://threatpost.com/insi...ts-cybercriminal-favorite/150128/Insider Threats, a Cybercrimin...
https://threatpost.com/iot-...urity-healthcare-industry/150157/IoT Security Woes Plague Healt...
https://threatpost.com/plug...g-data-leak-manufacturing/150132/Plugging the Data Leak in Manu...
https://threatpost.com/google-bad-android-apps/149981/Google Enlists Help to Fight B...
https://threatpost.com/no-s...oogle-smart-speaker-hacks/149427/No ‘Silver Bullet’ Fix for Ale...
https://threatpost.com/marc...ubmission-takes-a-village/148470/Marc Rogers: Success of Anonym...
https://threatpost.com/thou...-bricked-by-silex-malware/146065/Thousands of IoT Devices Brick...
https://threatpost.com/news...on-physical-cyber-threats/140491/Newsmaker Interview: Bruce Sch...
https://threatpost.com/troy-mursch-botnet-trends/140010/Newsmaker Interview: Troy Murs...
https://threatpost.com/thre...re-pos-flaws-are-critical/149609/ThreatList: Most Retail Hardwa...
https://threatpost.com/thre...-impersonating-legit-ones/149505/ThreatList: Sharp Increase in ...
https://threatpost.com/thre...es-global-data-collection/149457/ThreatList: Google’s Advertisi...
https://threatpost.com/maco...ware-phishing-apt-attacks/148262/ThreatList: Apple Adware, Phis...
https://threatpost.com/poli...facial-recognition-survey/148097/ThreatList: Police Use of Faci...
https://threatpost.com/category/podcasts/PodcastsView all
https://threatpost.com/enfu...ats-and-iot-privacy-risks/150231/ENFUSE 2019: Security Regulati...
https://threatpost.com/news...ts-data-breach-fine-fails/150020/News Wrap: Voice Assistant Las...
https://threatpost.com/emot...techniques-and-procedures/149914/Emotet Resurgence Continues Wi...
https://threatpost.com/offi...sh-bed-bath-beyond-breach/149801/News Wrap: APTs, Office 365 Vo...

External Links (link to pages on other websites) - 25
URL Anchor Text
https://indd.adobe.com/view...c3b32-90d4-40a1-9a31-2c49c7a86075Advertise With Us

reasonable number of links (below 100) per page will give a better user experience.

1. keep the number of links per page below 100.
2. having more than 100 links in a single page will lead to a bad user experience, and it possibly runs into the risk of been considered as spam.
3. search engines may not follow all the links if you have too many of them in a single page.
Total Images Alt Present Alt Missing
54 27 27

27 images do not have Alt values.

Image URL - 54
https://media.threatpost.co...tes/103/2019/11/13145158/iPhone-Jailbreak-570x285.jpgCheckra1n iphone jailbreak
https://media.threatpost.co...103/2019/10/29085447/georgia-cyberattack-540x270.jpegGeorgia cyberattack
https://media.threatpost.co...ads/sites/103/2019/11/14164639/double-rat-540x270.jpgwsh rat revenge rat double thr...
https://media.threatpost.co...s/sites/103/2019/11/14084812/enfuse-2019--540x270.pngcalifornia privacy law enfuse ...
https://media.threatpost.co...s/103/2019/02/27122135/ecommerce_leaking2-540x270.pnggoogle analytics card skimmers
https://media.threatpost.co...uploads/sites/103/2019/11/14090552/botnet-540x270.jpgapt33 iran botnet attacks
https://media.threatpost.co...t/uploads/sites/103/2019/10/25125310/adobe-64x64.jpegadobe november patch tuesday
https://media.threatpost.co...s/sites/103/2019/11/12153434/insider-threat-64x64.jpgenfuse 2019
https://media.threatpost.co...s/103/2019/11/12160251/abstract_network_iot-64x64.jpgmedical device security regula...
https://media.threatpost.co...8/13182411/DEF-CON-Anonymous-bug-submission-64x64.jpgdef con anonymous bug submissi...
https://media.threatpost.co...ent/uploads/sites/103/2019/03/14101859/pos1-64x64.jpgretail hardware critical bugs
https://media.threatpost.co...t/uploads/sites/103/2019/10/23114037/google-64x64.jpggoogle advertising tracker
https://media.threatpost.co...3/2019/09/11161516/threats-to-macos-users-3-64x64.pngmacos cyber threats
https://media.threatpost.co...s/103/2018/11/12101942/Facial-Recognition-2-64x64.jpgfacial recognition use by poli...
https://media.threatpost.co...s/103/2019/11/07154210/news-wrap-podcast--540x270.jpgdata breach
https://media.threatpost.co...s/sites/103/2018/10/16140719/data-breach-540x270.jpegbed bath & beyond office 365 a...
https://media.threatpost.co...loads/sites/103/2018/09/18093429/p1050753-540x270.jpgfacebook whatsapp sues nso gro...
https://media.threatpost.co.../uploads/sites/103/2019/03/06141757/Robot-540x270.jpgstalkerware ftc hotel robots s...
https://media.threatpost.co...tes/103/2019/10/17164730/insider-threat-2-540x270.jpginsider threat
https://media.threatpost.co...s/sites/103/2019/11/14084812/enfuse-2019--540x270.pngcalifornia privacy law enfuse ...
https://media.threatpost.co...5844/Screen-Shot-2019-08-06-at-6.57.10-PM-540x270.pngblack hat 2019 iot kids
https://media.threatpost.co.../2018/06/18164023/padlock-e1529354441282-540x270.jpegdata security in the cloud
https://media.threatpost.co...tes/103/2019/02/14094016/mobile-security-540x270.jpegtelco attack phone number redi...
https://media.threatpost.co...tes/103/2019/02/14094016/mobile-security-540x270.jpegmobile security Threatpost pol...
https://media.threatpost.co...s/103/2019/03/13171604/insider-threat-sad-540x270.jpginsider threat
https://media.threatpost.co...ploads/sites/103/2018/12/11133718/malware-540x270.jpgcobalt malware threadkit
https://media.threatpost.co...03/07052214/Ryan-McGeehan-and-Chad-Greene-540x270.jpgRyan McGeehan and Chad Greene

search engines cannot `see` images, proper Alt content will help them to better understand and index images.

1. always add alt attributes to images. Alt is mandatory for accessibility and for valid XHTML.
2. words used within an image`s Alt attribute should be its text equivalent and convey the same information.
3. use a human-readable caption and descriptive text around the image.
Style Block In Same Page Links to External Style Files Total
0 1 1

Excellent! all stylesheets are kept in separate files.

Links To External Stylesheet Files - 1
Stylesheet URL rel type

Scripts Block In Same Page Links to External Script Files Total
25 8 33

Too many (8) external scripts files , it will slow down the downlaoding.

Links To External Script Files - 8
Script URL Type

put scripts together and link them from an external files rather then put them in the same file as the main page.

1. reduce the use of in-page scripts, put them in separate files and link them in.
2. reduce the number of external script files, it will help browser to make lesser number of http requests from the server.
3. optimize or compress the script files to have smaller size and faster loading.
Blog Or News Release
Link to Blog / News Release Page
http://threatpost.com/#modal_newsletterSubscribe now

Excellent! we have found blog linked to your site.

Having a blog is a great way to provide fresh content and retain users, search engines favour it too.

1. regularly update your blog and provide fresh and quality content.
2. relevant blogs of your website topics, generate more credits in the eyes of your visitors, as well as search engines.
DMOZ Listing

Your site is not listed in the DMOZ Open Directory. DMOZ Open Directory Project

Google Analytics
Analytics Service is not implemented for the site.

Google Page Rank
6 Excellent! the website has a high page rank (6/10).

0 - 1 2 - 3 4 - 10
Poor Good Excellent
Links From Root Domains
Excellent! You do have a lot of root domains (62) linked to your site threatpost.com.

< 20 21 - 50 > 51
Poor Good Excellent

Number of backlinks from some other root domains is an indicator of domain authority, the more backlinks your site has, the higher its domain authority, which leads to a higher chance of better ranking.

1. make it easy for others to link to your site, provide the code if possible.
2. links from older domains are more powerful than links from new domains.
3. links from .edu and .gov generally have a higher value.
Social Engagement
Your site has an excellent social media engagement!

  Facebook Likes 10
  Facebook Shares 84
  Facebook Comments 28
  Tweets 835
  LinkedIn 0

Social Media Integration
Excellent! your site is well integrated with social media networks.

Facebook Pagehttps://www.facebook.com/Threatpost/
Twitter Accounthttps://twitter.com/threatpost/
Google+ PageNot Found


Excellent! the website has a good Trustworthiness Score (93/100).

0 - 19 20 - 39 40 - 59 60 - 79 80 - 100
Very Poor Poor Unsatisfactory Good Excellent

Users are concerned about the safety of their online transactions. Trustworthiness rating is based on real user ratings and that tells you how much other users trust this site, so do the serch engines. note: this trustworthiness score is provided by WOT (Web of Trust).

1. pay attention to the look and design of your site, many people look for visual cues when assessing a site`s credibility
2. make your site easy to use, sites that are easy to navigate are perceived as being more trustworthy.
3. make it easy for user to contact you, users will be more comfortable and feel more secured shall they need to get in touch with you.
Child Safe
93 Excellent! the website has a good Child Safe Score (93/100).

0 - 19 20 - 39 40 - 59 60 - 79 80 - 100
Very Poor Poor Unsatisfactory Good Excellent

Safe Browsing
Safe! the site threatpost.com is NOT currently listed as suspicious, most-likely it is clean from malware and phining code [ verify this by Google Safe Browsing ]

Ensure that your site is malware free and does not cause harm to users` computers.

1. do not put virus, malicious worms, adwares, trojans, spywares and suspicious phishing code in your server.
2. take suspicious behaviours seriously, have a regular check-up and monitor closely of your server`s log files.
3. if your site is black-listed by Google as suspicious, clean it up before requesting for a review.
Traffic Rank
56,523th most visited website in the world.
15,546th most visited website in United States  

your site has an excellent high traffic rank in the world.
Websites On Same Server
Excellent! You do have very few domains (2 - securelist.com, threatpost.com) hosted on the same server as threatpost.com (ip :

Too many domains hosted on the same server is an indicator that you are not really serious about your website, and your site will have a higher chance to be surrounded by bad neighbours.

1. the fewer domains hosted on the same server/ip the better.
2. avoid shared hosting whenever possible, especially when there are already hundreds or thousands of sites are hosted on the same server.
3. dedicated ip or resources for your site not only do good to your site visitors but also favoured by search engines.
Server Location
your server (IP : is located at United States  
the most site visitors come from United States  

Excellent! your server is located close to most of your site visitors.
HTTP Compression

your website server does not support HTTP Compression.


your website server does not support Caching.

Server Signature
Excellent! the website server signature is off.

A secure and safe server is not only good for your site visitors but also good for search engines.

1. server software version information can be utilized by malicious visitors to attack your server.
2. by turning off the server signature, you actually have made your server a little bit more secure.
3. for Apache server - edit the apache2.conf or the .htaccess file to turn server signature off.
Domain Age
10 years, 356 days old ( 1st registered on : 2008-12-23 )

excellent, the domain age is old enough.

Domain Expires
0 years, 8 days from today ( expires on : 2019-12-23 )

domain is expiring in less than a year.

Domain Info
threatpost.com ( 14 characters )

Domain Registrar : MarkMonitor Inc.

Domain Created On Last Modified On Expires On
2008-12-23 2017-11-21 2019-12-23
10 years, 356 days old 2 years, 23 days ago 0 years, 8 days from today
10 years, 356 days old

Domain Name Servers used by threatpost.com
DNS Name IP Address

Domain is going to expire in less than a year time (0 years, 8 days from today), try to renew it for more than one year!

domain name choice and domain age are crucial for SEO.

1. keep the domain name short and relevant to the content, which will be easier to be remembered and related to.
2. older domain tends to be more trustworthy.
3. register a domain for more than 1 year, and search engine will think it is a serious business.


Generating Report ......

Completed 0 of 30 tasks in generating the seo report!

"SEO Tools to Review & Audit Website for Improving Rankings in Search Engines."

HP Most Optimized

Terms of use   |   News   |   FAQ   |   Contact Us

copyright © 2019 seocert.net, all rights reserved