Phishing Hacking (as a verb) Data Logs 1337 Bot Breach Exploit Bug Keylogger End- User AI IP Tracker Black Hat Cyber Cyber attack Anonymous Nuclear Malware Main Frame Spoofing Brute force VPN Dark Web Trojan Vulnerability Chinese Intelligence Zero- Day Binary Script Next- Gen Unix White Hat Patch Social Media Penetration Encryption admin Virus Root Extortion Spam Cloud Gbps Linux Machine Learning Domain Legacy Ransom- ware Phishing Hacking (as a verb) Data Logs 1337 Bot Breach Exploit Bug Keylogger End- User AI IP Tracker Black Hat Cyber Cyber attack Anonymous Nuclear Malware Main Frame Spoofing Brute force VPN Dark Web Trojan Vulnerability Chinese Intelligence Zero- Day Binary Script Next- Gen Unix White Hat Patch Social Media Penetration Encryption admin Virus Root Extortion Spam Cloud Gbps Linux Machine Learning Domain Legacy Ransom- ware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Phishing
Hacking (as a verb)
Data Logs
1337
Bot
Breach
Exploit
Bug
Keylogger
End-User
AI
IP Tracker
Black Hat
Cyber
Cyber attack
Anonymous
Nuclear
Malware
Main Frame
Spoofing
Brute force
VPN
Dark Web
Trojan
Vulnerability
Chinese
Intelligence
Zero-Day
Binary Script
Next-Gen
Unix
White Hat
Patch
Social Media
Penetration
Encryption
admin
Virus
Root
Extortion
Spam
Cloud
Gbps
Linux
Machine Learning
Domain
Legacy
Ransom-ware