e- mail Ransomware Phishing DDos Anti- Virus Spoofing Brute Force Data Attack Personal Information Device Brute Force Internet of Things Drive-by Downloads Vulnerability Spoofing Device Malware Trojan Horse Trojan Horse SPAM Hacker Drive-by Downloads Ransomware Personal Information Attack Password Dictionary Attack Social Engineering Phishing Social Engineering Password Dictionary Attack Cryptojacking Password Network Data DDos Internet of Things Cryptojacking Malware Network IP Address e- mail Ransomware Phishing DDos Anti- Virus Spoofing Brute Force Data Attack Personal Information Device Brute Force Internet of Things Drive-by Downloads Vulnerability Spoofing Device Malware Trojan Horse Trojan Horse SPAM Hacker Drive-by Downloads Ransomware Personal Information Attack Password Dictionary Attack Social Engineering Phishing Social Engineering Password Dictionary Attack Cryptojacking Password Network Data DDos Internet of Things Cryptojacking Malware Network IP Address
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
e-mail
Ransomware
Phishing
DDos
Anti-Virus
Spoofing
Brute Force
Data
Attack
Personal Information
Device
Brute Force
Internet of Things
Drive-by Downloads
Vulnerability
Spoofing
Device
Malware
Trojan Horse
Trojan Horse
SPAM
Hacker
Drive-by Downloads
Ransomware
Personal Information
Attack
Password
Dictionary Attack
Social Engineering
Phishing
Social Engineering
Password
Dictionary Attack
Cryptojacking
Password
Network
Data
DDos
Internet of Things
Cryptojacking
Malware
Network
IP Address