Exploit White hat Cloud Ransomware Breach Rootkit Home Network Security Blacklist Deepfake Trojan Adware Maximum Security Data Protection Bot Antivirus Spyware BYOD Internet Security Malware Firewall Pay Guard Backdoor Worm DDoS Data Theft Virus Insider threat Privacy Scanner Encryption Keylogger Security Software Pentesting Full Scan Clickjacking Domain Pay Guard APT Quick Scan Phishing Authenticator VPN Folder Shield IP Address Honeypot Mute Mode Vulnerability Trend Micro Hacker Black hat Privacy Social Engineering Exploit White hat Cloud Ransomware Breach Rootkit Home Network Security Blacklist Deepfake Trojan Adware Maximum Security Data Protection Bot Antivirus Spyware BYOD Internet Security Malware Firewall Pay Guard Backdoor Worm DDoS Data Theft Virus Insider threat Privacy Scanner Encryption Keylogger Security Software Pentesting Full Scan Clickjacking Domain Pay Guard APT Quick Scan Phishing Authenticator VPN Folder Shield IP Address Honeypot Mute Mode Vulnerability Trend Micro Hacker Black hat Privacy Social Engineering
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Exploit
White hat
Cloud
Ransomware
Breach
Rootkit
Home Network Security
Blacklist
Deepfake
Trojan
Adware
Maximum Security
Data Protection
Bot
Antivirus
Spyware
BYOD
Internet Security
Malware
Firewall
Pay Guard
Backdoor
Worm
DDoS
Data Theft
Virus
Insider threat
Privacy Scanner
Encryption
Keylogger
Security
Software
Pentesting
Full Scan
Clickjacking
Domain
Pay Guard
APT
Quick Scan
Phishing
Authenticator
VPN
Folder Shield
IP Address
Honeypot
Mute Mode
Vulnerability
Trend Micro
Hacker
Black hat
Privacy
Social Engineering