Hacker Clickjacking Hack Multipartite Virus Trojan Horses Watering Hole Attacks Resident Virus SQL Injections Phishing Virus Overwrite Virus Keylogger Hack Polymorphic Virus Spacefiller Virus Browser Hijacker Boot Sector Virus Trojan Spacefiller Virus Cookies Hacker Macro Virus Bait and Switch Hack Denial of Services Fake Wireless Access Points (W.A.P) Theft of Cookies Web Scripting Virus Distribute Denial of Services Hacker Clickjacking Hack Multipartite Virus Trojan Horses Watering Hole Attacks Resident Virus SQL Injections Phishing Virus Overwrite Virus Keylogger Hack Polymorphic Virus Spacefiller Virus Browser Hijacker Boot Sector Virus Trojan Spacefiller Virus Cookies Hacker Macro Virus Bait and Switch Hack Denial of Services Fake Wireless Access Points (W.A.P) Theft of Cookies Web Scripting Virus Distribute Denial of Services
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Hacker
Clickjacking Hack
Multipartite Virus
Trojan Horses
Watering Hole Attacks
Resident Virus
SQL Injections
Phishing
Virus
Overwrite Virus
Keylogger Hack
Polymorphic Virus
Spacefiller Virus
Browser Hijacker
Boot Sector Virus
Trojan
Spacefiller Virus
Cookies Hacker
Macro Virus
Bait and Switch Hack
Denial of Services
Fake Wireless Access Points (W.A.P)
Theft of Cookies
Web Scripting Virus
Distribute Denial of Services