Trojan Horses Keylogger Hack Web Scripting Virus Distribute Denial of Services Resident Virus Fake Wireless Access Points (W.A.P) Watering Hole Attacks Macro Virus Browser Hijacker Cookies Hacker Spacefiller Virus Overwrite Virus Polymorphic Virus Spacefiller Virus Hacker Boot Sector Virus Trojan Virus Multipartite Virus Bait and Switch Hack Phishing Theft of Cookies Denial of Services SQL Injections Clickjacking Hack Trojan Horses Keylogger Hack Web Scripting Virus Distribute Denial of Services Resident Virus Fake Wireless Access Points (W.A.P) Watering Hole Attacks Macro Virus Browser Hijacker Cookies Hacker Spacefiller Virus Overwrite Virus Polymorphic Virus Spacefiller Virus Hacker Boot Sector Virus Trojan Virus Multipartite Virus Bait and Switch Hack Phishing Theft of Cookies Denial of Services SQL Injections Clickjacking Hack
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Trojan Horses
Keylogger Hack
Web Scripting Virus
Distribute Denial of Services
Resident Virus
Fake Wireless Access Points (W.A.P)
Watering Hole Attacks
Macro Virus
Browser Hijacker
Cookies Hacker Spacefiller Virus
Overwrite Virus
Polymorphic Virus
Spacefiller Virus
Hacker
Boot Sector Virus
Trojan
Virus
Multipartite Virus
Bait and Switch Hack
Phishing
Theft of Cookies
Denial of Services
SQL Injections
Clickjacking Hack