(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
G-Does Your Device Have Malware?
B-How to Keep Your Bluetooth Happy
I-Transportation Scams
O-Brute Force Attacks
N-Imposter Scams
N-Passwords, Managers, and MFA
G-Charity Scams
O-Securing Your Mobile Device from Eavesdropping
B-Recognizing and Reporting Phishing
B-Online Tracking
O-The Cyber Twilight Zone
G-Fitness Scams
I-IoT and Smart Devices
O-Holiday Shopping Scam
I- Credential Stuffing Attacks
B-Attack Surfaces: Physical and Digital
I-Attack Vectors: Active and Passive
G-MFA Fatigue Attacks
N-Marketplace Scams
B-Securing Your Computer From Eavesdropping
G-Securing Your Smart Home and IOT Devices From Eavesdropping