This video below is a step by step explanation of how one of the latest, and currently most dangerous, cyber attacks works.
There are many forms of Cyber Attacks, and this is just one. It is almost impossible to defend against this form of attack as each one can be unique. One particularly frightening feature of this attack is that it attempts to defeat email reputation measures, by establishing a chain of email messages with you, slowly increasing your trust.