Bug Binary Script Malware Main Frame Keylogger Dark Web Ransom- ware VPN Spoofing Encryption Patch Nuclear Legacy End- User Next- Gen Virus Gbps Cyber Black Hat Intelligence Phishing Machine Learning Social Media Cyber attack Unix AI IP Tracker Linux Spam Bot Zero- Day Root Brute force Exploit Hacking (as a verb) White Hat Anonymous Extortion Breach Trojan Vulnerability Penetration Chinese Cloud 1337 Domain admin Data Logs Bug Binary Script Malware Main Frame Keylogger Dark Web Ransom- ware VPN Spoofing Encryption Patch Nuclear Legacy End- User Next- Gen Virus Gbps Cyber Black Hat Intelligence Phishing Machine Learning Social Media Cyber attack Unix AI IP Tracker Linux Spam Bot Zero- Day Root Brute force Exploit Hacking (as a verb) White Hat Anonymous Extortion Breach Trojan Vulnerability Penetration Chinese Cloud 1337 Domain admin Data Logs
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Bug
Binary Script
Malware
Main Frame
Keylogger
Dark Web
Ransom-ware
VPN
Spoofing
Encryption
Patch
Nuclear
Legacy
End-User
Next-Gen
Virus
Gbps
Cyber
Black Hat
Intelligence
Phishing
Machine Learning
Social Media
Cyber attack
Unix
AI
IP Tracker
Linux
Spam
Bot
Zero-Day
Root
Brute force
Exploit
Hacking (as a verb)
White Hat
Anonymous
Extortion
Breach
Trojan
Vulnerability
Penetration
Chinese
Cloud
1337
Domain
admin
Data Logs