(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
B-Recognizing and Reporting Phishing
I-Updating Pro Tips
O-Display Name Scams
I-Transportation Scams
G-MFA Fatigue Attacks
O-Holiday Shopping Scam
O-Brute Force Attacks
B-How to Keep Your Bluetooth Happy
I- Credential Stuffing Attacks
I-Attack Vectors: Active and Passive
G-Does Your Device Have Malware?
B-Online Tracking
G-Charity Scams
G-Fitness Scams
O-Securing Your Mobile Device from Eavesdropping
N-Marketplace Scams
I-IoT and Smart Devices
B-Attack Surfaces: Physical and Digital
O-The Cyber Twilight Zone
N-QR Code Phishing
G-Securing Your Smart Home and IOT Devices From Eavesdropping