The Sony studio has recently pulled a major release after an alarming cyber attack orchestrated by a group of unknown hackers. Last 25th of November, the hackers who preferred to call themselves ‘Guardians of Peace’ have stolen a multitude of documents and private emails from the Sony network. They claimed that if the studio will release the film, The Interview, on December 25, they will expose to the public the private documents and files they have illegally acquired from the Sony network.
The movie, The Interview, is about two journalists who were given the chance to interview North Korea Dictator Kim Jong Un. The movie plot is said to revolve around the fictional attempt to assassinate North Korea’s leader Kim Jong-Un – a story demeaning and disrespectful in the eyes of many North Koreans.
Some of the private data and documents that the Guardians of Peace have already made public are the e-mails between directors, writers, producers, and actors about how George Clooney was upset because of the negative reviews critiques made on his movie, The Monuments Men, why Angelina Jolie is a “minimally talented spoiled brat”, what movies President Obama must prefer because they feature African American actors, etc.
Last Thursday, the White House organized a briefing where spokesman John Earnest had confirmed that US authorities have organized discussions about the recent Sony cyber attack, emphasizing the need for an appropriate response on the controversial issue. Furthermore, spokesman John Earnest had also mentioned that the Sony cyber attack can be classified as a “destructive activity with malicious intent that was initiated by a sophisticated actor” (ABC, 2014).As to who is behind the cybercrime is not yet known, but an investigation by the Department of Justice and the Federal Bureau of Investigation is currently underway. Despite the United States officials’ indication last Wednesday that the government may soon ensure the involvement of Pyongyang government in the issue, the White House still does not put any blame on North Korea. This is why President Barack Obama, with the help of several government agencies, is continuously monitoring the cyber issue caused by one of the biggest groups of hackers in the world.
Experts say that more cyber warfares are likely to occur in the future. This is why in the wake of the dramatic cyber attack, many companies that belong in the technology sector are currently tightening their security networks in order to avoid being victims of the same issues Sony is faced with as of the moment. Moreover, because of the issue, many internet users are wondering whether they should still rely on online transactions and the use of electronic mails especially during this period where several attacks are made against various companies.
According to EdgeWave Security’s head of cyber-operations, Tom Chapman, the key to addressing cyber issues and attacks is to know who the real enemy is because if a particular company understands its likely adversaries, it will be much easier for the said business organization to craft a reliable and strong defense. (Liedtke et al., 2014)
At the end of the day, cyber issues are growing problems that should alarm not only companies but also each internet user. Everyone needs to be aware of the threats internet-related activities pose so as to remain safe virtually and in real life. Most individuals nowadays put most of their personal data online, but cyberspace is a venue which can no longer be trusted for the reason that it has already been penetrated by abusive individuals who aim to go after their own self-serving agendas. What people ought to do now is remain vigilant of the threats that come along with being a netizen.
ABC. (2014). Sony hacking attack: US considers ‘proportionate’ response to ‘serious national security matter’. Retrieved
Liedtke, M., Condon, B., D’Innocenzio, A., Pisani, J., Krisher, T., & Bridis, T. Companies’ Data Security in
Question After Sony Hack.
Reuters. (2014). Sony hack: White House Views Attack as a Security Issue. Retrieveed from
Sky News. (2014). Sonny Attack: What Secrets did Hacker Reveal? Retrieved from