How Hacks Happen
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
Episodes
79 episodes
Personal Pest Control: Cybersecurity Awareness Month
October is Cybersecurity Awareness Month, and it's time to clean house! Let's get rid of all those dust bunnies (weak passwords) and vacuum under the sofa cushions (no multi-factor authentication) and even do a check under the bed for that half...
•
Season 5
•
Episode 9
•
24:01
AI Gone Rogue: Delusional Chats Lead to Heartbreak
AI is great for researching topics and digging up information. But what happens when people start to humanize their chatbots, and think they're talking to God? Or that they are God? Let's look at what makes AI come up with delusional t...
•
Season 5
•
Episode 8
•
23:46
Quick Tip: Protecting Your Money With Face ID
There's a new scam going around, where a thief gets you to unlock your phone under the guise of needing to make a call, then runs off with the phone and sends themselves all your money through your apps. Learn how to protect yourself and your m...
•
Season 5
•
Episode 7
•
4:28
Bug Bounties: Getting Paid to Hack
The finale of HBO's Silicon Valley series pointed up a subtle parallel to the real-world challenges in vulnerability reporting—rather than risk going to jail, Pied Piper chose to burn the company to the ground. For decades, white hat and gray h...
•
Season 5
•
Episode 6
•
24:04
Red Team: The Best Job in Cybersecurity (Until You Get Arrested)
What is Red Teaming, and what does it have to do with cybersecurity? In this episode, we look at how Red Teamers are hired to attack company security using all manner of tactics, from tossing malware-infested USB sticks into parking lots to pos...
•
Season 5
•
Episode 5
•
29:05
Random Number Generators Pt 3: Under the Hood
What goes on under the hood of random number generators (RNGs)? Here we look at one of the best sources of randomness—static from electronic chips—and discuss terminology like entropy and bias, the role of the Birthday Paradox in ...
•
Season 5
•
Episode 4
•
24:22
Random Number Generators Pt 2: Unsecure Devices
Ever heard of the Internet of Things, or IoT? This episode explores the use of random numbers in our everyday devices, and how they’re often not as secure as our PCs. We also look at how Apple gets it right, and what we can do to keep our devic...
•
Season 5
•
Episode 3
•
25:00
Random Number Generators Pt 1: Cheating at Video Games
This episode explores the mysterious world of random number generators (RNGs) in video games. Looking at popular games like Minecraft, Stardew Valley, and Diablo II, we describe how players hack these random numbers in the same ways hackers hac...
•
Season 5
•
Episode 2
•
24:01
Welcome to Season 5!
New season, new theme music—and even more hacks and scams to explore. Thanks for coming on these adventures with me. Let's do some more!
•
Season 5
•
0:38
Payday Loans: A Very American Scam
Need cash quick? Why not try a payday loan? While it might look like a better option than a credit card on its surface, the truth is that payday loans can be rather ugly and expensive, and can trap you in a cycle of debt if you don't know how i...
•
Season 5
•
Episode 1
•
24:07
Summer 2025 Tour of Scams: Job Scams, Sextortion, and Threats
Scammers are still at it, happy to ruin our lives in search of a quick buck. Let's look at job scams that attempt to steal personal information, sextortion scams preying on teenage boys, and a really nasty threatening email I personally receive...
•
Season 4
•
Episode 14
•
24:16
Hacks Ain't What They Used to Be
Hacks used to be impressive, utilizing bits and pieces of technology that made us sit up and pay attention. Nowadays, every scam, breach, or sketchy text message gets labelled a "hack" when it's really just basic use of existing technology, or ...
•
Season 4
•
Episode 13
•
26:19
Who owns your trash? It's probably not you.
In this episode of How Hacks Happen, we delve into the complexities surrounding trash possession and legalities. Besides the legal distinctions between lost, mislaid, and abandoned property, there are the risks posed by scammers who rifle throu...
•
Season 4
•
Episode 12
•
23:39
The Amanda Knox Case: How To Get Arrested for Being Weird
Can you tell if someone is guilty just by looking at them? Let's delve into the infamous case of Amanda Knox, the American exchange student who was wrongfully accused of murdering her roommate in 2007. We'll talk bad cell phone forensics, media...
•
Season 4
•
Episode 11
•
27:33
Send Me a Text! I'd love to hear from you.
Send me a text! No matter who you are or where you are in the world, I'd love to hear from you. This is a call for feedback on what you like about How Hacks Happen, what you don't like, or if you just want to say Hi.Click the "Send us a ...
•
Season 4
•
Episode 10
•
3:12
Coinbase Hack and Impending Crypto Doom
In May 2025, Coinbase, one of the largest cryptocurrency exchanges in the world, got hacked. Or did they? It was more like a near-miss. But while we might wipe our brows in relief over this latest mishap, it doesn't bode well for the future of ...
•
Season 4
•
Episode 9
•
27:01
Stingray Part II: The Fight for Privacy
In this episode we continue the story of Daniel Rigmaiden, a man arrested for tax fraud in 2008 who reveals the Stingray surveillance device used by the Feds to track his location. Despite being in jail, Rigmaiden tirelessly researches and file...
•
Season 4
•
Episode 8
•
23:52
Stingray Part I: Does Cell Phone Surveillance Violate Your Rights?
In 2014, the US government chose not to take a massive, rock-solid tax fraud case to trial. But why? This episode kicks off the tale of Daniel Rigmaiden, a hacker who exploited a legal loophole to regain his freedom. Find out how Rigmaiden's me...
•
Season 4
•
Episode 7
•
24:55
Identity Theft: Three Stories | Replay
Is your identity at risk? And what would you do if someone was using it to take out credit cards, steal your tax refund, or even raid your bank account? Enjoy this replay of interviews with Tiffany, Pete, and Astrid, three victims of identity t...
•
Season 4
•
Episode 6
•
49:46
Social Media Smoke: Razzlekhan, Dutch, and the $4 Billion Heist
When over 100,000 Bitcoin went missing in 2016, no one suspected the culprits: a quiet, mild-mannered developer and his ostentatious entrepreneur/rapper wife with a wacky social media presence. Meet Razzlekhan and Dutch, the most unlikely thiev...
•
Season 4
•
Episode 5
•
24:02
Social Media Smoke: Andrew Tate and The Real World
Why is Andrew Tate so popular with young men? With his sports cars and his obvious wealth, Tate has built a significant following out of his admittedly silly 'alpha male' rants. But behind the flashy lifestyle lies a web of controversy, includi...
•
Season 4
•
Episode 4
•
25:57
Social Media Fraud: Hushpuppi and the Designer Lifestyle
Instagram star Hushpuppi had over 2 million followers. With his amazing lifestyle filled with Ferraris and Rolls Royces and private jets, dressed head-to-toe in Gucci and Versace and Fendi, Hushpuppi seemed to have it all. But Hushpuppi's lifes...
•
Season 4
•
Episode 3
•
23:53
April Fool's Day Exclusive: The Blackberry at the End of the Universe
A Blackberry phone as a hacking tool?! For our April Fool's Day episode, we bring you an exclusive interview with hacking genius Dave the Barber, who leveraged a freak accident with a Blackberry into a hack that can compromise any device until ...
•
Season 4
•
Episode 2
•
9:40
Social Media Fraud: Fyre Festival
Want to hang out with supermodels on the beach? That's the dream that Billy McFarland sold in 2017 when he advertised Fyre Festival, an outdoor music concert in the Bahamas. Attendees were promised beautiful beaches, live music, comfy villas, g...
•
Season 4
•
Episode 1
•
29:21
Hacker, Broker, Scam: Following Stolen Data
When a scam caller knows everything about you--your address, social security number, bank account--how do they know? There isn't some super powerful hacker ring with its own call center. Your data is actually stolen at one end of the internet, ...
•
Season 3
•
Episode 19
•
23:39