DirtyAngel most classical encryption methods are theoretically vulnerable to attacks using Shor's algorithm (or slight variations). If you'd really like to learn more about it, here's a great video on how it basically works (against encryption schemes based around factoring large products of primes, at least):
The catch is that Shor's algorithm requires a quantum computer with many more qubits than we have available today. Today's largest quantum computers only have around 1000 qubits. That sounds like a lot, but consider that a modern smartphone has trillions of classical bits, and you realize it's not that many.
Plus, the qubits we're working with today aren't perfect - often they can only operate correctly under extreme conditions, such as near-absolute-zero temperatures. Because of this, today's quantum computers have to have some amount of redundancy built in, which will cut down the effective number of qubits available for compute.
At the end of the day, if someone wants to decrypt your data, they'll have to capture a copy of it and store it for many years -- until we have larger, more capable quantum computers available. Storing that data has obvious costs. Harvey put it best:
Harvey You are not worth the effort.
Edit: I also ought to add that modern encryption schemes are already seeking to counter this problem. Algorithms like NTRU or the CRYSTALS family of encryption schemes are considered "post-quantum" because they aren't based on problems vulnerable to Shor's algorithm. It's an exciting time.