Summary of Inside the Sony Hack

Looking for the article?
We have the summary! Get the key insights in just 5 minutes.

Inside the Sony Hack summary
Start getting smarter:
or see our plans


9 Overall

10 Importance

8 Innovation

9 Style


In this unnerving article, Slate contributor Amanda Hess interviews multiple anonymous Sony Pictures employees, who give their perspectives on the enormous North Korean cyberattack on the company. The unprecedented attack on Sony’s complete digital infrastructure included blocking all company data from employee access and the hacking of highly sensitive personal employee information. Hess shines a light on what it felt like to be a Sony employee in the days and weeks following the attack. getAbstract recommends this article to anyone whose company maintains a digital presence.

In this summary, you will learn

  • Why various stakeholders criticized Sony Pictures’ response to the North Korean cyberattack in November 2014; and
  • How the cyberattack affected 7,000 Sony employees, past and present.

About the Author

Amanda Hess is a prolific writer for Slate, producing various articles about social media, the Internet and social issues. She is also a David Carr fellow at The New York Times.



On November 24, 2014, North Korea allegedly hacked Sony Pictures in response to the political comedy film The Interview, which humorously depicts the death of dictator Kim Jong-un. The hackers threatened to publicly release Sony data. The attack blocked all employees from Sony’s software, files and databases for weeks, leaving computers virtually useless. Employees relied on face-to-face conversations and handwritten communications to continue work, going well beyond their typical work schedules and job descriptions in order to...

More on this topic

By the same author

How Privacy Became a Commodity for the Rich and Powerful

Customers who read this summary also read

Welcome to Zuckerworld
How to Encrypt Your Entire Life in Less than an Hour
The Malicious Use of Artificial Intelligence
How to Hack an Election
The Wretched, Endless Cycle of Bitcoin Hacks
Inside the Cyberattack That Shocked the US Government

Related Channels

Comment on this summary