Interferes witha wirelesssignal usingmatchingfrequenciesInterruptssignal bymatchingfrequencyand powerShort-rangewireless techattacked byBluejackingDiscoversrogueaccesspoints in anetworkVPNsprotectagainstpublic Wi-FirisksPolicyneeded forguest Wi-Fi accessSendsshockingimages viaBluetoothUnauthorizedWi-Fi thatimitates areal hotspotDeviceadded tonetworkwithoutpermissionAttackusing caféWi-FiimitationWhenBluetooth isused to stealdata likecontactsUnauthorizedwireless pointinstalled on asecurenetworkSocialengineeringlets attackersinstall this onnetworksA textphishingattackmethodUses fakeWi-Fi tocapturelogin infoSends faketexts to trickusers intogiving infoAddsunapprovedcapabilitieshidden in useragreementsOccurs whenattackercopies infovia BluetoothDe-authenticationspoofing canstart thisattackEncryptionhelps protectthis kind ofcommunicationTracks yourlocationthrough a legalbut unwantedapp featureUses short-range pairingbetweendevicesTool used tofindunauthorizeddevicesAnnoyingbut not trulymalicioussoftwareInterferes witha wirelesssignal usingmatchingfrequenciesInterruptssignal bymatchingfrequencyand powerShort-rangewireless techattacked byBluejackingDiscoversrogueaccesspoints in anetworkVPNsprotectagainstpublic Wi-FirisksPolicyneeded forguest Wi-Fi accessSendsshockingimages viaBluetoothUnauthorizedWi-Fi thatimitates areal hotspotDeviceadded tonetworkwithoutpermissionAttackusing caféWi-FiimitationWhenBluetooth isused to stealdata likecontactsUnauthorizedwireless pointinstalled on asecurenetworkSocialengineeringlets attackersinstall this onnetworksA textphishingattackmethodUses fakeWi-Fi tocapturelogin infoSends faketexts to trickusers intogiving infoAddsunapprovedcapabilitieshidden in useragreementsOccurs whenattackercopies infovia BluetoothDe-authenticationspoofing canstart thisattackEncryptionhelps protectthis kind ofcommunicationTracks yourlocationthrough a legalbut unwantedapp featureUses short-range pairingbetweendevicesTool used tofindunauthorizeddevicesAnnoyingbut not trulymalicioussoftware

1.4 Wireless and Mobile Device Attacks - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Interferes with a wireless signal using matching frequencies
  2. Interrupts signal by matching frequency and power
  3. Short-range wireless tech attacked by Bluejacking
  4. Discovers rogue access points in a network
  5. VPNs protect against public Wi-Fi risks
  6. Policy needed for guest Wi-Fi access
  7. Sends shocking images via Bluetooth
  8. Unauthorized Wi-Fi that imitates a real hotspot
  9. Device added to network without permission
  10. Attack using café Wi-Fi imitation
  11. When Bluetooth is used to steal data like contacts
  12. Unauthorized wireless point installed on a secure network
  13. Social engineering lets attackers install this on networks
  14. A text phishing attack method
  15. Uses fake Wi-Fi to capture login info
  16. Sends fake texts to trick users into giving info
  17. Adds unapproved capabilities hidden in user agreements
  18. Occurs when attacker copies info via Bluetooth
  19. De-authentication spoofing can start this attack
  20. Encryption helps protect this kind of communication
  21. Tracks your location through a legal but unwanted app feature
  22. Uses short-range pairing between devices
  23. Tool used to find unauthorized devices
  24. Annoying but not truly malicious software