Theft ofCookiesMultipartiteVirusWateringHoleAttacksFakeWirelessAccessPoints(W.A.P)DistributeDenial ofServicesKeyloggerHackMacroVirusMacroVirusHackerVirusBootSectorVirusResidentVirusKeyloggerHackDistributeDenial ofServicesBrowserHijackerSQLInjectionsResidentVirusVirusOverwriteVirusCookiesPolymorphicVirusTrojanDenialofServicesClickjackingHackTrojanHorsesOverwriteVirusBrowserHijackerBait andSwitchHackPhishingClickjackingHackHackerWebScriptingVirusFakeWirelessAccessPoints(W.A.P)Free!WateringHoleAttacksPhishingTheft ofCookiesBait andSwitchHackTrojanWebScriptingVirusSQLInjectionsTrojanHorsesDenialofServicesCookiesMultipartiteVirusPolymorphicVirusSpacefillerVirusBootSectorVirusSpacefillerVirusTheft ofCookiesMultipartiteVirusWateringHoleAttacksFakeWirelessAccessPoints(W.A.P)DistributeDenial ofServicesKeyloggerHackMacroVirusMacroVirusHackerVirusBootSectorVirusResidentVirusKeyloggerHackDistributeDenial ofServicesBrowserHijackerSQLInjectionsResidentVirusVirusOverwriteVirusCookiesPolymorphicVirusTrojanDenialofServicesClickjackingHackTrojanHorsesOverwriteVirusBrowserHijackerBait andSwitchHackPhishingClickjackingHackHackerWebScriptingVirusFakeWirelessAccessPoints(W.A.P)Free!WateringHoleAttacksPhishingTheft ofCookiesBait andSwitchHackTrojanWebScriptingVirusSQLInjectionsTrojanHorsesDenialofServicesCookiesMultipartiteVirusPolymorphicVirusSpacefillerVirusBootSectorVirusSpacefillerVirus

Computer Virus Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Theft of Cookies
  2. Multipartite Virus
  3. Watering Hole Attacks
  4. Fake Wireless Access Points (W.A.P)
  5. Distribute Denial of Services
  6. Keylogger Hack
  7. Macro Virus
  8. Macro Virus
  9. Hacker
  10. Virus
  11. Boot Sector Virus
  12. Resident Virus
  13. Keylogger Hack
  14. Distribute Denial of Services
  15. Browser Hijacker
  16. SQL Injections
  17. Resident Virus
  18. Virus
  19. Overwrite Virus
  20. Cookies
  21. Polymorphic Virus
  22. Trojan
  23. Denial of Services
  24. Clickjacking Hack
  25. Trojan Horses
  26. Overwrite Virus
  27. Browser Hijacker
  28. Bait and Switch Hack
  29. Phishing
  30. Clickjacking Hack
  31. Hacker
  32. Web Scripting Virus
  33. Fake Wireless Access Points (W.A.P)
  34. Free!
  35. Watering Hole Attacks
  36. Phishing
  37. Theft of Cookies
  38. Bait and Switch Hack
  39. Trojan
  40. Web Scripting Virus
  41. SQL Injections
  42. Trojan Horses
  43. Denial of Services
  44. Cookies
  45. Multipartite Virus
  46. Polymorphic Virus
  47. Spacefiller Virus
  48. Boot Sector Virus
  49. Spacefiller Virus