What is HSTS? How does it protect you on the internet?

But there are many minds who want to take advantage of the internet users for their own good. They indulge themselves in activities aimed at compromising the security of the users and breach their privacy. This can be done by imitating popular websites or injecting code in an HTTP website and luring users to visit them.