Browser Hijacker Keylogger Hack SQL Injections Clickjacking Hack Distribute Denial of Services Phishing Spacefiller Virus Denial of Services Keylogger Hack Spacefiller Virus SQL Injections Spacefiller Virus Macro Virus Hacker Multipartite Virus Phishing Fake Wireless Access Points (W.A.P) Watering Hole Attacks Denial of Services Distribute Denial of Services Cookies Resident Virus Trojan Clickjacking Hack Web Scripting Virus Theft of Cookies Browser Hijacker Hacker Trojan Horses Cookies Resident Virus Polymorphic Virus Macro Virus Boot Sector Virus Bait and Switch Hack Web Scripting Virus Virus Boot Sector Virus Polymorphic Virus Overwrite Virus Theft of Cookies Bait and Switch Hack Spacefiller Virus Overwrite Virus Watering Hole Attacks Multipartite Virus Trojan Fake Wireless Access Points (W.A.P) Virus Trojan Horses Browser Hijacker Keylogger Hack SQL Injections Clickjacking Hack Distribute Denial of Services Phishing Spacefiller Virus Denial of Services Keylogger Hack Spacefiller Virus SQL Injections Spacefiller Virus Macro Virus Hacker Multipartite Virus Phishing Fake Wireless Access Points (W.A.P) Watering Hole Attacks Denial of Services Distribute Denial of Services Cookies Resident Virus Trojan Clickjacking Hack Web Scripting Virus Theft of Cookies Browser Hijacker Hacker Trojan Horses Cookies Resident Virus Polymorphic Virus Macro Virus Boot Sector Virus Bait and Switch Hack Web Scripting Virus Virus Boot Sector Virus Polymorphic Virus Overwrite Virus Theft of Cookies Bait and Switch Hack Spacefiller Virus Overwrite Virus Watering Hole Attacks Multipartite Virus Trojan Fake Wireless Access Points (W.A.P) Virus Trojan Horses
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Browser Hijacker
Keylogger Hack
SQL Injections
Clickjacking Hack
Distribute Denial of Services
Phishing
Spacefiller Virus
Denial of Services
Keylogger Hack
Spacefiller Virus
SQL Injections
Spacefiller Virus
Macro Virus
Hacker
Multipartite Virus
Phishing
Fake Wireless Access Points (W.A.P)
Watering Hole Attacks
Denial of Services
Distribute Denial of Services
Cookies
Resident Virus
Trojan
Clickjacking Hack
Web Scripting Virus
Theft of Cookies
Browser Hijacker
Hacker
Trojan Horses
Cookies
Resident Virus
Polymorphic Virus
Macro Virus
Boot Sector Virus
Bait and Switch Hack
Web Scripting Virus
Virus
Boot Sector Virus
Polymorphic Virus
Overwrite Virus
Theft of Cookies
Bait and Switch Hack
Spacefiller Virus
Overwrite Virus
Watering Hole Attacks
Multipartite Virus
Trojan
Fake Wireless Access Points (W.A.P)
Virus
Trojan Horses