Moreover you have to be aware of sites with so-called mixed content.
Remember for a lot of sites that are forced to use https the security header situation is not optimal to say the least.
An example here:
https://www.uploady.com/#!/download/FouiM5aocH2/wiKm56SjCf5er_IkOne could check at
http://cyh.herokuapp.com/cyh and
http://www.webconfs.com/http-header-check.php and
https://securityheaders.com/test-http-headers.phpOr use an extension like
https://www.recx.co.uk/products/chromeplugin.php#httpheaderandcookieto check whether best policy measures were taken.
Look for issues here:
http://toolbar.netcraft.com/site_report/Some domains have problems like POODLE:
http://www.webconfs.com/http-header-check.phpOthers have exctensive server header proliferation problems, http only cookie warnings, and clickjacking warnings
For asp sites check at/scan with
https://asafaweb.com/The DNS configuration can be with issues (nameserver version proliferation, so script kiddies may attack):
http://www.dnsinspect.com/ or
http://dnscheck.iis.se/Now test some of what you find here:
https://www.eff.org/https-everywhere/atlas/and then reach your own conclusions why the majortity of websites both http and https are still grossly insecure and attackable.
Loads of sites are on outdated servers that are being badly managed and configured and webmasters keep websites up with
outdated and vulnerable CMS and even more vulnerable (free) plug-ins and themes.
Never assume your surfing is without risks and act accordingly and do not click randomly and become a victim of
adware tracking, monitoring, malcreants, ad retargeting, fingerprinting, viruses, worms, phishing, scams and fraud.
I hope you always will find the reliable, secure websites in between. Oh and feel protected through Avast

polonus