Denial of Services SQL Injections Theft of Cookies Trojan Multipartite Virus Bait and Switch Hack Browser Hijacker Trojan Horses Watering Hole Attacks Macro Virus Boot Sector Virus Spacefiller Virus Distribute Denial of Services Virus Resident Virus Phishing Fake Wireless Access Points (W.A.P) Clickjacking Hack Web Scripting Virus Keylogger Hack Cookies Hacker Spacefiller Virus Overwrite Virus Hacker Polymorphic Virus Denial of Services SQL Injections Theft of Cookies Trojan Multipartite Virus Bait and Switch Hack Browser Hijacker Trojan Horses Watering Hole Attacks Macro Virus Boot Sector Virus Spacefiller Virus Distribute Denial of Services Virus Resident Virus Phishing Fake Wireless Access Points (W.A.P) Clickjacking Hack Web Scripting Virus Keylogger Hack Cookies Hacker Spacefiller Virus Overwrite Virus Hacker Polymorphic Virus
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Denial of Services
SQL Injections
Theft of Cookies
Trojan
Multipartite Virus
Bait and Switch Hack
Browser Hijacker
Trojan Horses
Watering Hole Attacks
Macro Virus
Boot Sector Virus
Spacefiller Virus
Distribute Denial of Services
Virus
Resident Virus
Phishing
Fake Wireless Access Points (W.A.P)
Clickjacking Hack
Web Scripting Virus
Keylogger Hack
Cookies Hacker Spacefiller Virus
Overwrite Virus
Hacker
Polymorphic Virus