Trojan Denial of Services Clickjacking Hack Keylogger Hack Phishing Theft of Cookies Resident Virus Spacefiller Virus Multipartite Virus Web Scripting Virus Cookies Hacker Spacefiller Virus Bait and Switch Hack Distribute Denial of Services Hacker Browser Hijacker Trojan Horses Virus Overwrite Virus Boot Sector Virus Fake Wireless Access Points (W.A.P) Polymorphic Virus SQL Injections Macro Virus Watering Hole Attacks Trojan Denial of Services Clickjacking Hack Keylogger Hack Phishing Theft of Cookies Resident Virus Spacefiller Virus Multipartite Virus Web Scripting Virus Cookies Hacker Spacefiller Virus Bait and Switch Hack Distribute Denial of Services Hacker Browser Hijacker Trojan Horses Virus Overwrite Virus Boot Sector Virus Fake Wireless Access Points (W.A.P) Polymorphic Virus SQL Injections Macro Virus Watering Hole Attacks
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Trojan
Denial of Services
Clickjacking Hack
Keylogger Hack
Phishing
Theft of Cookies
Resident Virus
Spacefiller Virus
Multipartite Virus
Web Scripting Virus
Cookies Hacker Spacefiller Virus
Bait and Switch Hack
Distribute Denial of Services
Hacker
Browser Hijacker
Trojan Horses
Virus
Overwrite Virus
Boot Sector Virus
Fake Wireless Access Points (W.A.P)
Polymorphic Virus
SQL Injections
Macro Virus
Watering Hole Attacks