BrowserHijackerOverwriteVirusFakeWirelessAccessPoints(W.A.P)KeyloggerHackFree!WateringHoleAttacksBootSectorVirusFakeWirelessAccessPoints(W.A.P)MacroVirusHackerTrojanHorsesTrojanSpacefillerVirusTheft ofCookiesWebScriptingVirusClickjackingHackTrojanHorsesHackerBootSectorVirusTheft ofCookiesWateringHoleAttacksDistributeDenial ofServicesPolymorphicVirusSQLInjectionsDistributeDenial ofServicesBait andSwitchHackPhishingMultipartiteVirusSQLInjectionsClickjackingHackMacroVirusResidentVirusVirusTrojanPhishingWebScriptingVirusDenialofServicesPolymorphicVirusKeyloggerHackDenialofServicesBait andSwitchHackBrowserHijackerMultipartiteVirusCookiesResidentVirusSpacefillerVirusOverwriteVirusCookiesVirusBrowserHijackerOverwriteVirusFakeWirelessAccessPoints(W.A.P)KeyloggerHackFree!WateringHoleAttacksBootSectorVirusFakeWirelessAccessPoints(W.A.P)MacroVirusHackerTrojanHorsesTrojanSpacefillerVirusTheft ofCookiesWebScriptingVirusClickjackingHackTrojanHorsesHackerBootSectorVirusTheft ofCookiesWateringHoleAttacksDistributeDenial ofServicesPolymorphicVirusSQLInjectionsDistributeDenial ofServicesBait andSwitchHackPhishingMultipartiteVirusSQLInjectionsClickjackingHackMacroVirusResidentVirusVirusTrojanPhishingWebScriptingVirusDenialofServicesPolymorphicVirusKeyloggerHackDenialofServicesBait andSwitchHackBrowserHijackerMultipartiteVirusCookiesResidentVirusSpacefillerVirusOverwriteVirusCookiesVirus

Computer Virus Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Browser Hijacker
  2. Overwrite Virus
  3. Fake Wireless Access Points (W.A.P)
  4. Keylogger Hack
  5. Free!
  6. Watering Hole Attacks
  7. Boot Sector Virus
  8. Fake Wireless Access Points (W.A.P)
  9. Macro Virus
  10. Hacker
  11. Trojan Horses
  12. Trojan
  13. Spacefiller Virus
  14. Theft of Cookies
  15. Web Scripting Virus
  16. Clickjacking Hack
  17. Trojan Horses
  18. Hacker
  19. Boot Sector Virus
  20. Theft of Cookies
  21. Watering Hole Attacks
  22. Distribute Denial of Services
  23. Polymorphic Virus
  24. SQL Injections
  25. Distribute Denial of Services
  26. Bait and Switch Hack
  27. Phishing
  28. Multipartite Virus
  29. SQL Injections
  30. Clickjacking Hack
  31. Macro Virus
  32. Resident Virus
  33. Virus
  34. Trojan
  35. Phishing
  36. Web Scripting Virus
  37. Denial of Services
  38. Polymorphic Virus
  39. Keylogger Hack
  40. Denial of Services
  41. Bait and Switch Hack
  42. Browser Hijacker
  43. Multipartite Virus
  44. Cookies
  45. Resident Virus
  46. Spacefiller Virus
  47. Overwrite Virus
  48. Cookies
  49. Virus