SPAM Attack Dictionary Attack Data IP Address Phishing Personal Information Cryptojacking Anti- Virus Device Social Engineering e- mail Cryptojacking Device Hacker Trojan Horse Spoofing Password Password Password Malware Internet of Things Personal Information Drive-by Downloads Dictionary Attack Trojan Horse Data Attack Phishing Network Brute Force Malware DDos Spoofing Social Engineering Vulnerability Network Ransomware Drive-by Downloads Internet of Things Brute Force DDos Ransomware SPAM Attack Dictionary Attack Data IP Address Phishing Personal Information Cryptojacking Anti- Virus Device Social Engineering e- mail Cryptojacking Device Hacker Trojan Horse Spoofing Password Password Password Malware Internet of Things Personal Information Drive-by Downloads Dictionary Attack Trojan Horse Data Attack Phishing Network Brute Force Malware DDos Spoofing Social Engineering Vulnerability Network Ransomware Drive-by Downloads Internet of Things Brute Force DDos Ransomware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
SPAM
Attack
Dictionary Attack
Data
IP Address
Phishing
Personal Information
Cryptojacking
Anti-Virus
Device
Social Engineering
e-mail
Cryptojacking
Device
Hacker
Trojan Horse
Spoofing
Password
Password
Password
Malware
Internet of Things
Personal Information
Drive-by Downloads
Dictionary Attack
Trojan Horse
Data
Attack
Phishing
Network
Brute Force
Malware
DDos
Spoofing
Social Engineering
Vulnerability
Network
Ransomware
Drive-by Downloads
Internet of Things
Brute Force
DDos
Ransomware