Investigation into the doxing campaign ("#hackerangriff") against German political figures continues. Bild reports that the BSI intelligence service asked US counterparts (in NSA especially) to lean on Twitter to isolate and take down accounts involved in distributing the leaked material. The BSI is said to have argued to NSA that some US citizens were also victims of the incident; thus assistance would be in order (Bloomberg). Interior Minister Seehofer has promised transparency in the investigation, with an interim report due out by midweek (Süddeutsche Zeitung).
On Friday Marriott released more results of investigation into its Starwood reservation systems breach. The good news is that fewer customers than feared were affected. The bad news is that the compromised data include a lot of unencrypted passport information. Marriott had initially believed the number of guests affected was around 500 million; the hospitality company now regards 383 million as the upper limit, and believes with "a fair degree of certainty" that the actual number is lower still. But the hackers accessed 5.25 million unencrypted (and more than 20 million encrypted) passport numbers. Roughly 8.6 million encrypted paycards were also exposed in the incident. Marriott doesn't believe the attackers got the master encryption keys (Washington Business Journal).
The breach at Town of Salem (the role-playing game, not the Massachusetts city) affected around 7.6 million players (HackRead). There's reason to think security-proud gamers may present hackers surprisingly easy targets of opportunity: McAfee thinks the average PC gamer has been hacked five times (Help Net Security).