How to address security vulnerabilities: LUCKY13, BEAST, and BREACH

How to address security vulnerabilities: LUCKY13, BEAST, and BREACH