SQLInjectionsWebScriptingVirusPhishingMacroVirusFakeWirelessAccessPoints(W.A.P)KeyloggerHackDenialofServicesSpacefillerVirusPhishingFree!Bait andSwitchHackCookiesTrojanHorsesBrowserHijackerHackerWateringHoleAttacksMultipartiteVirusSQLInjectionsWateringHoleAttacksTheft ofCookiesResidentVirusClickjackingHackVirusDistributeDenial ofServicesSpacefillerVirusMultipartiteVirusTrojanClickjackingHackTheft ofCookiesKeyloggerHackTrojanPolymorphicVirusBait andSwitchHackBootSectorVirusPolymorphicVirusWebScriptingVirusVirusBrowserHijackerOverwriteVirusOverwriteVirusHackerResidentVirusFakeWirelessAccessPoints(W.A.P)TrojanHorsesMacroVirusBootSectorVirusDenialofServicesCookiesDistributeDenial ofServicesSQLInjectionsWebScriptingVirusPhishingMacroVirusFakeWirelessAccessPoints(W.A.P)KeyloggerHackDenialofServicesSpacefillerVirusPhishingFree!Bait andSwitchHackCookiesTrojanHorsesBrowserHijackerHackerWateringHoleAttacksMultipartiteVirusSQLInjectionsWateringHoleAttacksTheft ofCookiesResidentVirusClickjackingHackVirusDistributeDenial ofServicesSpacefillerVirusMultipartiteVirusTrojanClickjackingHackTheft ofCookiesKeyloggerHackTrojanPolymorphicVirusBait andSwitchHackBootSectorVirusPolymorphicVirusWebScriptingVirusVirusBrowserHijackerOverwriteVirusOverwriteVirusHackerResidentVirusFakeWirelessAccessPoints(W.A.P)TrojanHorsesMacroVirusBootSectorVirusDenialofServicesCookiesDistributeDenial ofServices

Computer Virus Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. SQL Injections
  2. Web Scripting Virus
  3. Phishing
  4. Macro Virus
  5. Fake Wireless Access Points (W.A.P)
  6. Keylogger Hack
  7. Denial of Services
  8. Spacefiller Virus
  9. Phishing
  10. Free!
  11. Bait and Switch Hack
  12. Cookies
  13. Trojan Horses
  14. Browser Hijacker
  15. Hacker
  16. Watering Hole Attacks
  17. Multipartite Virus
  18. SQL Injections
  19. Watering Hole Attacks
  20. Theft of Cookies
  21. Resident Virus
  22. Clickjacking Hack
  23. Virus
  24. Distribute Denial of Services
  25. Spacefiller Virus
  26. Multipartite Virus
  27. Trojan
  28. Clickjacking Hack
  29. Theft of Cookies
  30. Keylogger Hack
  31. Trojan
  32. Polymorphic Virus
  33. Bait and Switch Hack
  34. Boot Sector Virus
  35. Polymorphic Virus
  36. Web Scripting Virus
  37. Virus
  38. Browser Hijacker
  39. Overwrite Virus
  40. Overwrite Virus
  41. Hacker
  42. Resident Virus
  43. Fake Wireless Access Points (W.A.P)
  44. Trojan Horses
  45. Macro Virus
  46. Boot Sector Virus
  47. Denial of Services
  48. Cookies
  49. Distribute Denial of Services