MultipartiteVirusBait andSwitchHackHackerTheft ofCookiesClickjackingHackTheft ofCookiesPhishingWateringHoleAttacksDenialofServicesBrowserHijackerTrojanDenialofServicesWateringHoleAttacksMultipartiteVirusHackerCookiesPolymorphicVirusBrowserHijackerCookiesVirusPolymorphicVirusResidentVirusOverwriteVirusFakeWirelessAccessPoints(W.A.P)BootSectorVirusSQLInjectionsOverwriteVirusDistributeDenial ofServicesVirusTrojanHorsesFakeWirelessAccessPoints(W.A.P)MacroVirusClickjackingHackKeyloggerHackDistributeDenial ofServicesKeyloggerHackSQLInjectionsFree!PhishingWebScriptingVirusMacroVirusWebScriptingVirusTrojanResidentVirusBait andSwitchHackTrojanHorsesBootSectorVirusSpacefillerVirusSpacefillerVirusMultipartiteVirusBait andSwitchHackHackerTheft ofCookiesClickjackingHackTheft ofCookiesPhishingWateringHoleAttacksDenialofServicesBrowserHijackerTrojanDenialofServicesWateringHoleAttacksMultipartiteVirusHackerCookiesPolymorphicVirusBrowserHijackerCookiesVirusPolymorphicVirusResidentVirusOverwriteVirusFakeWirelessAccessPoints(W.A.P)BootSectorVirusSQLInjectionsOverwriteVirusDistributeDenial ofServicesVirusTrojanHorsesFakeWirelessAccessPoints(W.A.P)MacroVirusClickjackingHackKeyloggerHackDistributeDenial ofServicesKeyloggerHackSQLInjectionsFree!PhishingWebScriptingVirusMacroVirusWebScriptingVirusTrojanResidentVirusBait andSwitchHackTrojanHorsesBootSectorVirusSpacefillerVirusSpacefillerVirus

Computer Virus Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Multipartite Virus
  2. Bait and Switch Hack
  3. Hacker
  4. Theft of Cookies
  5. Clickjacking Hack
  6. Theft of Cookies
  7. Phishing
  8. Watering Hole Attacks
  9. Denial of Services
  10. Browser Hijacker
  11. Trojan
  12. Denial of Services
  13. Watering Hole Attacks
  14. Multipartite Virus
  15. Hacker
  16. Cookies
  17. Polymorphic Virus
  18. Browser Hijacker
  19. Cookies
  20. Virus
  21. Polymorphic Virus
  22. Resident Virus
  23. Overwrite Virus
  24. Fake Wireless Access Points (W.A.P)
  25. Boot Sector Virus
  26. SQL Injections
  27. Overwrite Virus
  28. Distribute Denial of Services
  29. Virus
  30. Trojan Horses
  31. Fake Wireless Access Points (W.A.P)
  32. Macro Virus
  33. Clickjacking Hack
  34. Keylogger Hack
  35. Distribute Denial of Services
  36. Keylogger Hack
  37. SQL Injections
  38. Free!
  39. Phishing
  40. Web Scripting Virus
  41. Macro Virus
  42. Web Scripting Virus
  43. Trojan
  44. Resident Virus
  45. Bait and Switch Hack
  46. Trojan Horses
  47. Boot Sector Virus
  48. Spacefiller Virus
  49. Spacefiller Virus