Information Security Terms
A type of phishing attack that targets specific victims. But instead of sending out an email to millions of email addresses, cyber attackers send out a very small number of crafted emails to very specific individuals, usually all at the same organization. Because of the targeted nature of this attack, spear phishing attacks are often harder to detect and usually more effective at fooling the victims.
A shortened form of "Trojan Horse", this type of malware appears to have a legitimate or at least benign use, but masks a hidden sinister function. For example, you may download and install a free screensaver which actually works well as a screensaver. But that software could also be malicious, it will infect your computer once you install it.
A man-in-the-cloud attack manipulates the file synching service of the cloud to gain full access to a user's account by stealing a copy of their synchronization token. Using social engineering ploy, the attacker will get the user give it unknowingly by having them click on a simple code file disguised as something else.
For more information visit the original article: Man-In-The-Cloud Owns Your DropBox, Google Drive -- Sans Malware.