Policyneeded forguest Wi-Fi accessTracks yourlocationthrough a legalbut unwantedapp featureSends faketexts to trickusers intogiving infoSendsshockingimages viaBluetoothUses fakeWi-Fi tocapturelogin infoAddsunapprovedcapabilitieshidden in useragreementsSocialengineeringlets attackersinstall this onnetworksOccurs whenattackercopies infovia BluetoothVPNsprotectagainstpublic Wi-FirisksTool used tofindunauthorizeddevicesUses short-range pairingbetweendevicesAttackusing caféWi-FiimitationUnauthorizedwireless pointinstalled on asecurenetworkDiscoversrogueaccesspoints in anetworkEncryptionhelps protectthis kind ofcommunicationAnnoyingbut not trulymalicioussoftwareShort-rangewireless techattacked byBluejackingInterferes witha wirelesssignal usingmatchingfrequenciesUnauthorizedWi-Fi thatimitates areal hotspotDeviceadded tonetworkwithoutpermissionInterruptssignal bymatchingfrequencyand powerA textphishingattackmethodWhenBluetooth isused to stealdata likecontactsDe-authenticationspoofing canstart thisattackPolicyneeded forguest Wi-Fi accessTracks yourlocationthrough a legalbut unwantedapp featureSends faketexts to trickusers intogiving infoSendsshockingimages viaBluetoothUses fakeWi-Fi tocapturelogin infoAddsunapprovedcapabilitieshidden in useragreementsSocialengineeringlets attackersinstall this onnetworksOccurs whenattackercopies infovia BluetoothVPNsprotectagainstpublic Wi-FirisksTool used tofindunauthorizeddevicesUses short-range pairingbetweendevicesAttackusing caféWi-FiimitationUnauthorizedwireless pointinstalled on asecurenetworkDiscoversrogueaccesspoints in anetworkEncryptionhelps protectthis kind ofcommunicationAnnoyingbut not trulymalicioussoftwareShort-rangewireless techattacked byBluejackingInterferes witha wirelesssignal usingmatchingfrequenciesUnauthorizedWi-Fi thatimitates areal hotspotDeviceadded tonetworkwithoutpermissionInterruptssignal bymatchingfrequencyand powerA textphishingattackmethodWhenBluetooth isused to stealdata likecontactsDe-authenticationspoofing canstart thisattack

1.4 Wireless and Mobile Device Attacks - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Policy needed for guest Wi-Fi access
  2. Tracks your location through a legal but unwanted app feature
  3. Sends fake texts to trick users into giving info
  4. Sends shocking images via Bluetooth
  5. Uses fake Wi-Fi to capture login info
  6. Adds unapproved capabilities hidden in user agreements
  7. Social engineering lets attackers install this on networks
  8. Occurs when attacker copies info via Bluetooth
  9. VPNs protect against public Wi-Fi risks
  10. Tool used to find unauthorized devices
  11. Uses short-range pairing between devices
  12. Attack using café Wi-Fi imitation
  13. Unauthorized wireless point installed on a secure network
  14. Discovers rogue access points in a network
  15. Encryption helps protect this kind of communication
  16. Annoying but not truly malicious software
  17. Short-range wireless tech attacked by Bluejacking
  18. Interferes with a wireless signal using matching frequencies
  19. Unauthorized Wi-Fi that imitates a real hotspot
  20. Device added to network without permission
  21. Interrupts signal by matching frequency and power
  22. A text phishing attack method
  23. When Bluetooth is used to steal data like contacts
  24. De-authentication spoofing can start this attack