Backup iPhone Malware Decryption Malicious links Virus 2FA Images (PII) Cyber- Bullying Credit Card # Compromised Trojan Horse Siri Encryption Biometrics Mobile Devices Smart Devices Spam Identity theft Online Fraud Cybersecurity Phishing Whd@b33f? monkey123 Flash Drive Hacking Cipher Anti- Virus Backup iPhone Malware Decryption Malicious links Virus 2FA Images (PII) Cyber- Bullying Credit Card # Compromised Trojan Horse Siri Encryption Biometrics Mobile Devices Smart Devices Spam Identity theft Online Fraud Cybersecurity Phishing Whd@b33f? monkey123 Flash Drive Hacking Cipher Anti- Virus
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
B-Backup
R-iPhone
C-Malware
E-Decryption
E-Malicious links
C-Virus
B-2FA
R-Images
Y-(PII)
B-Cyber-
Bullying
R-Credit Card #
C-Compromised
Y-Trojan Horse
E-Siri
B-Encryption
E-Biometrics
C-Mobile Devices
Y-Smart Devices
Y-Spam
C-Identity theft
R-Online Fraud
E-Cybersecurity
Y-Phishing
E-Whd@b33f?
R-monkey123
Y-Flash Drive
B-Hacking
C-Cipher
R-Anti-Virus