(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Interrupts signal by matching frequency and power
Occurs when attacker copies info via Bluetooth
Annoying but not truly malicious software
De-authentication spoofing can start this attack
Unauthorized Wi-Fi that imitates a real hotspot
Tracks your location through a legal but unwanted app feature
Adds unapproved capabilities hidden in user agreements
Social engineering lets attackers install this on networks
VPNs protect against public Wi-Fi risks
Tool used to find unauthorized devices
Device added to network without permission
Attack using café Wi-Fi imitation
Uses fake Wi-Fi to capture login info
Encryption helps protect this kind of communication
Uses short-range pairing between devices
A text phishing attack method
Interferes with a wireless signal using matching frequencies
Sends shocking images via Bluetooth
Short-range wireless tech attacked by Bluejacking
Discovers rogue access points in a network
Policy needed for guest Wi-Fi access
Sends fake texts to trick users into giving info
When Bluetooth is used to steal data like contacts
Unauthorized wireless point installed on a secure network