HackerTrojanHorsesDenialofServicesWebScriptingVirusFakeWirelessAccessPoints(W.A.P)TrojanHorsesPolymorphicVirusSpacefillerVirusMacroVirusVirusTrojanDistributeDenial ofServicesKeyloggerHackResidentVirusResidentVirusMultipartiteVirusMultipartiteVirusCookiesBrowserHijackerHackerWebScriptingVirusBootSectorVirusSpacefillerVirusBrowserHijackerBait andSwitchHackWateringHoleAttacksPolymorphicVirusOverwriteVirusPhishingWateringHoleAttacksPhishingOverwriteVirusBootSectorVirusCookiesDenialofServicesTheft ofCookiesClickjackingHackSQLInjectionsSQLInjectionsKeyloggerHackFakeWirelessAccessPoints(W.A.P)MacroVirusVirusBait andSwitchHackTrojanFree!ClickjackingHackDistributeDenial ofServicesTheft ofCookiesHackerTrojanHorsesDenialofServicesWebScriptingVirusFakeWirelessAccessPoints(W.A.P)TrojanHorsesPolymorphicVirusSpacefillerVirusMacroVirusVirusTrojanDistributeDenial ofServicesKeyloggerHackResidentVirusResidentVirusMultipartiteVirusMultipartiteVirusCookiesBrowserHijackerHackerWebScriptingVirusBootSectorVirusSpacefillerVirusBrowserHijackerBait andSwitchHackWateringHoleAttacksPolymorphicVirusOverwriteVirusPhishingWateringHoleAttacksPhishingOverwriteVirusBootSectorVirusCookiesDenialofServicesTheft ofCookiesClickjackingHackSQLInjectionsSQLInjectionsKeyloggerHackFakeWirelessAccessPoints(W.A.P)MacroVirusVirusBait andSwitchHackTrojanFree!ClickjackingHackDistributeDenial ofServicesTheft ofCookies

Computer Virus Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Hacker
  2. Trojan Horses
  3. Denial of Services
  4. Web Scripting Virus
  5. Fake Wireless Access Points (W.A.P)
  6. Trojan Horses
  7. Polymorphic Virus
  8. Spacefiller Virus
  9. Macro Virus
  10. Virus
  11. Trojan
  12. Distribute Denial of Services
  13. Keylogger Hack
  14. Resident Virus
  15. Resident Virus
  16. Multipartite Virus
  17. Multipartite Virus
  18. Cookies
  19. Browser Hijacker
  20. Hacker
  21. Web Scripting Virus
  22. Boot Sector Virus
  23. Spacefiller Virus
  24. Browser Hijacker
  25. Bait and Switch Hack
  26. Watering Hole Attacks
  27. Polymorphic Virus
  28. Overwrite Virus
  29. Phishing
  30. Watering Hole Attacks
  31. Phishing
  32. Overwrite Virus
  33. Boot Sector Virus
  34. Cookies
  35. Denial of Services
  36. Theft of Cookies
  37. Clickjacking Hack
  38. SQL Injections
  39. SQL Injections
  40. Keylogger Hack
  41. Fake Wireless Access Points (W.A.P)
  42. Macro Virus
  43. Virus
  44. Bait and Switch Hack
  45. Trojan
  46. Free!
  47. Clickjacking Hack
  48. Distribute Denial of Services
  49. Theft of Cookies