The vulnerabilities posed by SSL/TLS protocols could result in remote attackers decrypting the secure communication and possibly exposing your confidential information.
What should I do if I think I’ve been attacked via one of these vulnerabilities?
If your device is behaving strangely or showing signs of an exploitable vulnerability, bring it to a third-party computer repair technician to resolve the problem.