POODLE attacks (Padding Oracle on Downgraded Legacy Encryption) decrypt and extract information from inside an encrypted transaction on your computer or network and potentially ultimately take over your accounts like Google or Twitter without requiring your passwords.
FAQs about POODLE Attacks
What’s a POODLE attack?
Am I at risk of POODLE attacks?
All systems or applications using Secure Sockets Layer (SSL) v. 3.0 with cipher-block chaining (CBC) mode ciphers are vulnerable to POODLE attacks.
What do I do if I experience a POODLE attack?
If you have the expertise, disable the POODLE vulnerable server (SSL v. 3) or restrict access to only trusted IP addresses. If you don’t have the expertise for the above, or if you’ve completed the above but your device is still acting strangely, bring it to a third-party computer repair technician to solve the problem.