How Hacks Happen
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
Episodes
84 episodes
Glitches in the Matrix
Glitch or fraud? Let's explore "money glitches" popularized on social media, and the consequences faced by people who used them. Resources:The Chase Money 'Glitc...
•
Season 6
•
Episode 1
•
23:06
2025: The Year of AI Scams
AI is undoubtedly the technology of the year for hacks and scams. While scammers are busy using AI to make scams more convincing, scam baiters are fighting back with ingenious grandma-style AIs that keep scammers busy for hours on end. There ha...
•
Season 5
•
Episode 13
•
23:02
The Barber Shop Scammers
Ever get your hair cut and wonder, "Is my barber part of an international scammer ring?" In November 2025, the FBI arrested Victor Marion, the owner of Mecca Barber Shop in San Diego, and eighteen of his buddies for scamming elderly victims out...
•
Season 5
•
Episode 12
•
23:44
It's Official: Facebook is Scammy
If Facebook has seemed scammy for the past few years, it's not your imagination. A leaked internal document shows that Facebook, and its parent company Meta, are well aware that many of their ads and posts are scams, but they make too much mone...
•
Season 5
•
Episode 11
•
23:11
Signing Your Life Away: Subscriber Agreements
Do you tap "Accept" without reading subscriber agreements? Those long-winded documents can strip away your legal rights, and even hijack your face, your voice, and your life. Let's peek inside the dystopian world of Subscriber Agreements for st...
•
Season 5
•
Episode 10
•
25:13
Personal Pest Control: Cybersecurity Awareness Month
October is Cybersecurity Awareness Month, and it's time to clean house! Let's get rid of all those dust bunnies (weak passwords) and vacuum under the sofa cushions (no multi-factor authentication) and even do a check under the bed for that half...
•
Season 5
•
Episode 9
•
23:25
AI Gone Rogue: Delusional Chats Lead to Heartbreak
AI is great for researching topics and digging up information. But what happens when people start to humanize their chatbots, and think they're talking to God? Or that they are God? Let's look at what makes AI come up with delusional t...
•
Season 5
•
Episode 8
•
23:11
Quick Tip: Protecting Your Money With Face ID
There's a new scam going around, where a thief gets you to unlock your phone under the guise of needing to make a call, then runs off with the phone and sends themselves all your money through your apps. Learn how to protect yourself and your m...
•
Season 5
•
Episode 7
•
4:28
Bug Bounties: Getting Paid to Hack
The finale of HBO's Silicon Valley series pointed up a subtle parallel to the real-world challenges in vulnerability reporting—rather than risk going to jail, Pied Piper chose to burn the company to the ground. For decades, white hat and gray h...
•
Season 5
•
Episode 6
•
23:29
Red Team: The Best Job in Cybersecurity (Until You Get Arrested)
What is Red Teaming, and what does it have to do with cybersecurity? In this episode, we look at how Red Teamers are hired to attack company security using all manner of tactics, from tossing malware-infested USB sticks into parking lots to pos...
•
Season 5
•
Episode 5
•
28:30
Random Number Generators Pt 3: Under the Hood
What goes on under the hood of random number generators (RNGs)? Here we look at one of the best sources of randomness—static from electronic chips—and discuss terminology like entropy and bias, the role of the Birthday Paradox in ...
•
Season 5
•
Episode 4
•
23:47
Random Number Generators Pt 2: Unsecure Devices
Ever heard of the Internet of Things, or IoT? This episode explores the use of random numbers in our everyday devices, and how they’re often not as secure as our PCs. We also look at how Apple gets it right, and what we can do to keep our devic...
•
Season 5
•
Episode 3
•
24:25
Random Number Generators Pt 1: Cheating at Video Games
This episode explores the mysterious world of random number generators (RNGs) in video games. Looking at popular games like Minecraft, Stardew Valley, and Diablo II, we describe how players hack these random numbers in the same ways hackers hac...
•
Season 5
•
Episode 2
•
23:26
Welcome to Season 5!
New season, new theme music—and even more hacks and scams to explore. Thanks for coming on these adventures with me. Let's do some more!
•
Season 5
•
0:38
Payday Loans: A Very American Scam
Need cash quick? Why not try a payday loan? While it might look like a better option than a credit card on its surface, the truth is that payday loans can be rather ugly and expensive, and can trap you in a cycle of debt if you don't know how i...
•
Season 5
•
Episode 1
•
23:32
Summer 2025 Tour of Scams: Job Scams, Sextortion, and Threats
Scammers are still at it, happy to ruin our lives in search of a quick buck. Let's look at job scams that attempt to steal personal information, sextortion scams preying on teenage boys, and a really nasty threatening email I personally receive...
•
Season 4
•
Episode 14
•
23:41
Hacks Ain't What They Used to Be
Hacks used to be impressive, utilizing bits and pieces of technology that made us sit up and pay attention. Nowadays, every scam, breach, or sketchy text message gets labelled a "hack" when it's really just basic use of existing technology, or ...
•
Season 4
•
Episode 13
•
25:44
Who owns your trash? It's probably not you.
In this episode of How Hacks Happen, we delve into the complexities surrounding trash possession and legalities. Besides the legal distinctions between lost, mislaid, and abandoned property, there are the risks posed by scammers who rifle throu...
•
Season 4
•
Episode 12
•
23:04
The Amanda Knox Case: How To Get Arrested for Being Weird
Can you tell if someone is guilty just by looking at them? Let's delve into the infamous case of Amanda Knox, the American exchange student who was wrongfully accused of murdering her roommate in 2007. We'll talk bad cell phone forensics, media...
•
Season 4
•
Episode 11
•
26:58
Send Me a Text! I'd love to hear from you.
Send me a text! No matter who you are or where you are in the world, I'd love to hear from you. This is a call for feedback on what you like about How Hacks Happen, what you don't like, or if you just want to say Hi.Click the "Send us a ...
•
Season 4
•
Episode 10
•
3:12
Coinbase Hack and Impending Crypto Doom
In May 2025, Coinbase, one of the largest cryptocurrency exchanges in the world, got hacked. Or did they? It was more like a near-miss. But while we might wipe our brows in relief over this latest mishap, it doesn't bode well for the future of ...
•
Season 4
•
Episode 9
•
26:26
Stingray Part II: The Fight for Privacy
In this episode we continue the story of Daniel Rigmaiden, a man arrested for tax fraud in 2008 who reveals the Stingray surveillance device used by the Feds to track his location. Despite being in jail, Rigmaiden tirelessly researches and file...
•
Season 4
•
Episode 8
•
23:17
Stingray Part I: Does Cell Phone Surveillance Violate Your Rights?
In 2014, the US government chose not to take a massive, rock-solid tax fraud case to trial. But why? This episode kicks off the tale of Daniel Rigmaiden, a hacker who exploited a legal loophole to regain his freedom. Find out how Rigmaiden's me...
•
Season 4
•
Episode 7
•
24:20
Identity Theft: Three Stories | Replay
Is your identity at risk? And what would you do if someone was using it to take out credit cards, steal your tax refund, or even raid your bank account? Enjoy this replay of interviews with Tiffany, Pete, and Astrid, three victims of identity t...
•
Season 4
•
Episode 6
•
49:11
Social Media Smoke: Razzlekhan, Dutch, and the $4 Billion Heist
When over 100,000 Bitcoin went missing in 2016, no one suspected the culprits: a quiet, mild-mannered developer and his ostentatious entrepreneur/rapper wife with a wacky social media presence. Meet Razzlekhan and Dutch, the most unlikely thiev...
•
Season 4
•
Episode 5
•
23:27