If you need to exit this site quickly, click on the ‘Leave site’ button on the right-hand side of the screen. This will take you to the browser homepage.
You should be aware that it is not possible to completely cover your tracks online. However, there are steps you can take to hide your movements to an extent. If you need to browse in complete privacy, use a different computer such as at a local library, internet café or at work.
Internet Explorer 11:
As with Internet Explorer 11, you can also use the CTRL + SHIFT + P shortcut.
To open a Private Window on a Mac, users can do a three-key combination of Command-Shift-N.
Otherwise, a Private Window can be opened by selecting the File menu and clicking on New Private Window.
What is a cache?
A cache is a special storage space for temporary files that makes a device, browser, or app run faster and more efficiently. 
What is a cookie?
Cookies are text files with small pieces of data — like a username and password — that are used to identify your computer as you use a computer network.
Data stored in a cookie is created by the server upon your connection. This data is labelled with an ID unique to you and your computer.
When the cookie is exchanged between your computer and the network server, the server reads the ID and knows what information to specifically serve to you. 
You can also set Firefox to automatically clear the cache when Firefox closes:
Internet Explorer 11:
You can also access this menu by pressing Ctrl + Shift + Delete.
Microsoft Edge & Bing:
Some search engines such as Chrome and Bing retain words and phrases you have typed into the search bar and show them when you or someone else next uses the search bar. If you clear your search history after each browsing session, this should not happen. However, we recommend checking the settings of the specific browser you use.
According to technology and IT security company Norton, “Spyware is a blanket term given to software that gathers information about your computer and the things you do on it and sends that information over the Internet to a third party. Spyware often installs itself on your computer without you knowing and runs in the background, secretly collecting data, or meddling with your computer set-up.” 
Perpetrators may have spyware installed on your device/s to monitor who you are talking to and when. Spyware has been known to record instant messages and Skype chats, control webcams and take screenshots. It can be sent via email, instant message and social media messages.
Here are signs to look out for that might suggest spyware has been installed on your device:
To protect yourself from spyware attacks, make sure you:
1 – Business Insider
2 – KasperSky
3 – Norton