Polymorphic Virus Browser Hijacker Denial of Services Hacker SQL Injections Multipartite Virus Macro Virus Bait and Switch Hack Overwrite Virus Fake Wireless Access Points (W.A.P) Web Scripting Virus Phishing Spacefiller Virus Watering Hole Attacks Boot Sector Virus Clickjacking Hack Virus Resident Virus Keylogger Hack Theft of Cookies Trojan Distribute Denial of Services Cookies Hacker Spacefiller Virus Trojan Horses Polymorphic Virus Browser Hijacker Denial of Services Hacker SQL Injections Multipartite Virus Macro Virus Bait and Switch Hack Overwrite Virus Fake Wireless Access Points (W.A.P) Web Scripting Virus Phishing Spacefiller Virus Watering Hole Attacks Boot Sector Virus Clickjacking Hack Virus Resident Virus Keylogger Hack Theft of Cookies Trojan Distribute Denial of Services Cookies Hacker Spacefiller Virus Trojan Horses
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Polymorphic Virus
Browser Hijacker
Denial of Services
Hacker
SQL Injections
Multipartite Virus
Macro Virus
Bait and Switch Hack
Overwrite Virus
Fake Wireless Access Points (W.A.P)
Web Scripting Virus
Phishing
Spacefiller Virus
Watering Hole Attacks
Boot Sector Virus
Clickjacking Hack
Virus
Resident Virus
Keylogger Hack
Theft of Cookies
Trojan
Distribute Denial of Services
Cookies Hacker Spacefiller Virus
Trojan Horses