How to stop ads from following you online

Is this just a coincidence? If you recently looked at cameras online, you’ll see ads for cameras. If you browsed new outfits, shirts and trousers emerge in the margins of your browser.
Not long ago, “interest-based advertising” creeped out many people. They couldn’t understand why (for example) Facebook knew what they had just shopped for on Amazon. The truth is that personalized ads are the result of a very impersonal process.
Your details are crunched bits of data that make marketing more efficient. Interest-based advertising uses information gathered through your browser. Special algorithms analyze your visits over time and across different websites. This helps predict your preferences and shows you ads that are more likely to be of interest to you.
Sometimes, all this tracking can overwhelm the average customer. While the process is basically automatic and unmanned, such ads can feel like an invasion of privacy. This is why many people look for ways to throw them off your scent.
Here are three simple ways you can do just that.
1. Wipe out history, turn off cookies
To start, you’ll want a clean slate. Eliminate any trace of your past searches. Clear all your browsing data, history, cache and cookies from your web browsers.
Next, disable or limit tracking on your gadget. This includes favorite services like Facebook. If you’re not sure exactly how to do this, click here for the steps to wipe out where you’ve been and what you’ve done.
Next, make sure you delete third-party advertising cookies too. Click here to learn how to remove them and prevent them from coming back.
Afterwards, take a moment and test your browser with an online security and privacy checker. I like the Electronic Frontier Foundation’s tool that shows you the information about the browser you’re using and your risk level. Click here for the free download and more details.
2. Opt out of ads
You may only notice a handful of culprits, but many companies use algorithms to track your behavior and send you targeted ads.
Thankfully, there’s a way for you to opt out of interest-based, or “behavioral,” ads. The Digital Advertising Alliance lets you review its participating partners. When you first visit the DAA, the websites will scan your computer. Once the scan is complete, you’ll be shown a list of partners advertising directly to you.
From there, you can learn more about the practices these companies use for interest-based ads. You can opt out using “opt-out cookies” that are stored in your browser with your preferences.
Click here for the steps to opt-out of this form of online targeted advertising.
3. Go incognito
Every major web browser – Chrome, Edge, Firefox, Internet Explorer, Safari, and Opera – has private, or incognito, browsing. Turning this feature on means your browser will ignore cookies, including ad-tracking cookies. Your computer won’t record your browsing history, almost like you were never online.
When your browser is in private browsing mode, it will show a special icon. In Firefox, it’s a mask; in Chrome it’s a little spy; and in Edge it’s “InPrivate.” These all indicate that you’re in incognito or private mode.
Private browsing will keep your computer safe from casual snoopers. Someone who jumps on your computer won’t see where you’ve been.
Learn more about private browsing as well as anonymous tools on my website.
Keep in mind that online ads aren’t necessarily a bad thing. Yes, they can annoy us, but they’re also the reason most online content is free. Without them, media outlets and content creators would have to find a different source of revenue. For most of us, seeing a few presumptuous ads is a tiny price to pay.
What questions do you have? Call my national radio show and click here to find it on your local radio station. You can listen to the Kim Komando Show on your phone, tablet or computer. From buying advice to digital life issues, click here for my free podcasts.
More from Komando.com
How to stop your devices from listening to (and saving) everything you say
3 ways to check out your neighbors
Decoy Facebook accounts, sharing large files, holiday jobs at Amazon, and more
3 best firewalls to keep the hackers out

Since online threats and security risks are everywhere, you need a strong security system. Aside from antivirus software, you also need a firewall. Think of it as your system’s gatekeeper:
Newer Windows systems all have built-in software firewalls, though they lack advanced features. Take this test to see if your current firewall is doing its job.
5 scams that are fooling even the smartest victims

Many people laugh at scams. We see an email from a mysterious stranger. The note is full of odd phrases and terrible misspellings. But not all scams are so easy to spot. Spammers get more sinister every day, and they use real-sounding email addresses, personal data, well-phrased letters and actual corporate logos to lure their victims. Do you know how to weed out the bad eggs hiding in your inbox?
The security setting to always turn on

You’ve been hearing a lot about the dangers lurking in the digital world. You see headlines that scream, “ransomware,” “hackers,” “scams,” “ID theft” and more. All this is truly scary. Yet, there is one tip that you can simply set up to prevent a lot of cybercrimes from adversely affecting your life.
How to check if your personal data was exposed in Equifax breach

More than 143 million Americans have just had their identities compromised. A breach at one of the largest credit bureaus is now being reported, exposing names, social security numbers, birth dates, addresses and even driver’s license numbers. Here’s what to do if your personal information is caught up in the mix.
How to stop hackers from using “Find my Device” to lock your gadget with ransomware

This feature is supposed to be a useful tool for tracking down your Apple gadget in case it’s lost. But imagine having a stranger use this very same tool for holding your gadgets for ransom. It is a scary thought but these attacks are happening right now!
Forget privacy! New feature lets you record ANYTHING, texts, photos and videos on your phone

Think your messages, photos and videos are private? You’re in for a big shock. A new feature in your phone’s operating system is going to create a huge privacy concern. Is privacy dead? Read this for the answer.
You've been doing your passwords all wrong! Fix them with these new tricks

Passwords are a necessary evil. They’re a pain to create and a struggle to remember. But if you don’t avoid these mistakes, you’ll make a hacker’s job much, much easier. Here’s the right way to create secure passwords.
AT&T router flaws put millions at risk
Attention AT&T customers, critical router flaws have been discovered that may be putting you at risk. One of the flaws is reported to be affecting millions of people and immediate action is suggested. I’ll tell you about the dangers of what these vulnerabilities are and ways to fix them.
Why you should NEVER throw away or post pictures of your airline boarding pass

Have you made this mistake when you travel? Identity thieves can do more with details from your boarding pass than you realize. You’ll be shocked when you find out just how far they can go, and the level of access you give them to your private records.
Amazon Prime Day phishing scam spreading now!

Amazon Prime Day was a huge hit, and that’s what scammers are counting on. A new phishing scheme is spreading now, making claims about orders you’ve placed on Amazon. But it’s a trick! I received this dangerous email myself, but luckily I know what to look for. Will you know how to spot this fake email when it shows up in your inbox?
Watch out! Phone repair shops can install secret key logging SCREENS

Who hasn’t experienced a cracked phone screen on at least a few different occasions? All it takes is a small fall that lands at just the right angle, and your device could be ruined. But what exactly is that third-party repair vendor installing. You won’t believe how easy it is for these vendors to install keyloggers that watch your every move.
How to spot disguised malicious files before they infect your computer

Imagine that you get an email from an acquaintance with an attachment so you download it and try to open it. Nothing happens except your computer is now infected with a nasty bug. Don’t let this happen to you.
Phishing emails tricking people into falling for tech support scams

Tech support scammers have found a whole new way to trick you. It’s a tactic many other scammers use, and it targets your inbox. These emails appear to be from legitimate sources, but if you click on them you could wind up paying out of your own pocket.
5 good habits that immensely improve your online security

In the age of drive-by downloads, ransomware, data breaches, rampant identity theft and millions of other digital threats, good online security is critical. Unfortunately, with attacks coming at you from every direction, it can sometimes feel like it’s impossible to keep up.
Sponsor: 5 tips to spot an email scam

Your inbox gets flooded every day with emails that look legitimate, but are actually a scam. And if you’re not paying attention, you could easily be tricked into handing over your private information. But spotting these emails can be tough sometimes. That’s why I’m sharing five tips on what to look for when it comes to these suspicious emails in your inbox.
Can this really stop malicious apps in the Google Play store?

Google Play is supposed to prevent malicious apps from slipping through. But we’ve seen report after report of fake apps hiding malware in them. Now, Google claims it has found a solution. Will it actually work, or is it just a gimmick so you won’t lose trust in your Android devices?
Use public Wi-Fi without getting hacked while traveling

Browsing the web on public Wi-Fi is tempting, but is it a good idea? While you’re waiting for your flight at the airport or settling in at your hotel, think twice before you go online. These tips are essential if you want to browse safely.
Common security risks every smartphone user should know about

Your cellphone is with you night and day, but is the very device you’ve come to depend on actually putting you at risk? If you’re not careful your smartphone could be the key hackers need to access your personal information.
Critical steps to secure your home Wi-Fi

If you think it’s complicated to lock down your home Wi-Fi, you’re wrong. And putting it off is impacting your security by leaving your network vulnerable. Don’t risk getting hacked! Follow these quick steps to keep snoops out.