DenialofServicesKeyloggerHackTrojanFakeWirelessAccessPoints(W.A.P)PhishingPolymorphicVirusSpacefillerVirusDenialofServicesHackerDistributeDenial ofServicesDistributeDenial ofServicesClickjackingHackBrowserHijackerFakeWirelessAccessPoints(W.A.P)Theft ofCookiesMultipartiteVirusSpacefillerVirusSQLInjectionsKeyloggerHackBait andSwitchHackBootSectorVirusWateringHoleAttacksMultipartiteVirusOverwriteVirusResidentVirusBrowserHijackerOverwriteVirusCookiesCookiesResidentVirusWateringHoleAttacksSQLInjectionsVirusTheft ofCookiesTrojanHorsesHackerBootSectorVirusVirusClickjackingHackTrojanHorsesMacroVirusWebScriptingVirusMacroVirusTrojanBait andSwitchHackWebScriptingVirusFree!PolymorphicVirusPhishingDenialofServicesKeyloggerHackTrojanFakeWirelessAccessPoints(W.A.P)PhishingPolymorphicVirusSpacefillerVirusDenialofServicesHackerDistributeDenial ofServicesDistributeDenial ofServicesClickjackingHackBrowserHijackerFakeWirelessAccessPoints(W.A.P)Theft ofCookiesMultipartiteVirusSpacefillerVirusSQLInjectionsKeyloggerHackBait andSwitchHackBootSectorVirusWateringHoleAttacksMultipartiteVirusOverwriteVirusResidentVirusBrowserHijackerOverwriteVirusCookiesCookiesResidentVirusWateringHoleAttacksSQLInjectionsVirusTheft ofCookiesTrojanHorsesHackerBootSectorVirusVirusClickjackingHackTrojanHorsesMacroVirusWebScriptingVirusMacroVirusTrojanBait andSwitchHackWebScriptingVirusFree!PolymorphicVirusPhishing

Computer Virus Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Denial of Services
  2. Keylogger Hack
  3. Trojan
  4. Fake Wireless Access Points (W.A.P)
  5. Phishing
  6. Polymorphic Virus
  7. Spacefiller Virus
  8. Denial of Services
  9. Hacker
  10. Distribute Denial of Services
  11. Distribute Denial of Services
  12. Clickjacking Hack
  13. Browser Hijacker
  14. Fake Wireless Access Points (W.A.P)
  15. Theft of Cookies
  16. Multipartite Virus
  17. Spacefiller Virus
  18. SQL Injections
  19. Keylogger Hack
  20. Bait and Switch Hack
  21. Boot Sector Virus
  22. Watering Hole Attacks
  23. Multipartite Virus
  24. Overwrite Virus
  25. Resident Virus
  26. Browser Hijacker
  27. Overwrite Virus
  28. Cookies
  29. Cookies
  30. Resident Virus
  31. Watering Hole Attacks
  32. SQL Injections
  33. Virus
  34. Theft of Cookies
  35. Trojan Horses
  36. Hacker
  37. Boot Sector Virus
  38. Virus
  39. Clickjacking Hack
  40. Trojan Horses
  41. Macro Virus
  42. Web Scripting Virus
  43. Macro Virus
  44. Trojan
  45. Bait and Switch Hack
  46. Web Scripting Virus
  47. Free!
  48. Polymorphic Virus
  49. Phishing