
How Hacks Happen
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
Episodes
74 episodes
Random Number Generators Pt 3: Under the Hood
What goes on under the hood of random number generators (RNGs)? Here we look at one of the best sources of randomness—static from electronic chips—and discuss terminology like entropy and bias, the role of the Birthday Paradox in ...
•
Season 5
•
Episode 4
•
23:47

Random Number Generators Pt 2: Unsecure Devices
Ever heard of the Internet of Things, or IoT? This episode explores the use of random numbers in our everyday devices, and how they’re often not as secure as our PCs. We also look at how Apple gets it right, and what we can do to keep our devic...
•
Season 5
•
Episode 3
•
24:25

Random Number Generators Pt 1: Cheating at Video Games
This episode explores the mysterious world of random number generators (RNGs) in video games. Looking at popular games like Minecraft, Stardew Valley, and Diablo II, we describe how players hack these random numbers in the same ways hackers hac...
•
Season 5
•
Episode 2
•
23:26

Welcome to Season 5!
New season, new theme music—and even more hacks and scams to explore. Thanks for coming on these adventures with me. Let's do some more!
•
Season 5
•
0:38

Payday Loans: A Very American Scam
Need cash quick? Why not try a payday loan? While it might look like a better option than a credit card on its surface, the truth is that payday loans can be rather ugly and expensive, and can trap you in a cycle of debt if you don't know how i...
•
Season 5
•
Episode 1
•
23:32

Summer 2025 Tour of Scams: Job Scams, Sextortion, and Threats
Scammers are still at it, happy to ruin our lives in search of a quick buck. Let's look at job scams that attempt to steal personal information, sextortion scams preying on teenage boys, and a really nasty threatening email I personally receive...
•
Season 4
•
Episode 14
•
23:41

Hacks Ain't What They Used to Be
Hacks used to be impressive, utilizing bits and pieces of technology that made us sit up and pay attention. Nowadays, every scam, breach, or sketchy text message gets labelled a "hack" when it's really just basic use of existing technology, or ...
•
Season 4
•
Episode 13
•
25:44

Who owns your trash? It's probably not you.
In this episode of How Hacks Happen, we delve into the complexities surrounding trash possession and legalities. Besides the legal distinctions between lost, mislaid, and abandoned property, there are the risks posed by scammers who rifle throu...
•
Season 4
•
Episode 12
•
23:04

The Amanda Knox Case: How To Get Arrested for Being Weird
Can you tell if someone is guilty just by looking at them? Let's delve into the infamous case of Amanda Knox, the American exchange student who was wrongfully accused of murdering her roommate in 2007. We'll talk bad cell phone forensics, media...
•
Season 4
•
Episode 11
•
26:58

Send Me a Text! I'd love to hear from you.
Send me a text! No matter who you are or where you are in the world, I'd love to hear from you. This is a call for feedback on what you like about How Hacks Happen, what you don't like, or if you just want to say Hi.Click the "Send us a ...
•
Season 4
•
Episode 10
•
3:12

Coinbase Hack and Impending Crypto Doom
In May 2025, Coinbase, one of the largest cryptocurrency exchanges in the world, got hacked. Or did they? It was more like a near-miss. But while we might wipe our brows in relief over this latest mishap, it doesn't bode well for the future of ...
•
Season 4
•
Episode 9
•
26:26

Stingray Part II: The Fight for Privacy
In this episode we continue the story of Daniel Rigmaiden, a man arrested for tax fraud in 2008 who reveals the Stingray surveillance device used by the Feds to track his location. Despite being in jail, Rigmaiden tirelessly researches and file...
•
Season 4
•
Episode 8
•
23:17

Stingray Part I: Does Cell Phone Surveillance Violate Your Rights?
In 2014, the US government chose not to take a massive, rock-solid tax fraud case to trial. But why? This episode kicks off the tale of Daniel Rigmaiden, a hacker who exploited a legal loophole to regain his freedom. Find out how Rigmaiden's me...
•
Season 4
•
Episode 7
•
24:20

Identity Theft: Three Stories | Replay
Is your identity at risk? And what would you do if someone was using it to take out credit cards, steal your tax refund, or even raid your bank account? Enjoy this replay of interviews with Tiffany, Pete, and Astrid, three victims of identity t...
•
Season 4
•
Episode 6
•
49:11

Social Media Smoke: Razzlekhan, Dutch, and the $4 Billion Heist
When over 100,000 Bitcoin went missing in 2016, no one suspected the culprits: a quiet, mild-mannered developer and his ostentatious entrepreneur/rapper wife with a wacky social media presence. Meet Razzlekhan and Dutch, the most unlikely thiev...
•
Season 4
•
Episode 5
•
23:27

Social Media Smoke: Andrew Tate and The Real World
Why is Andrew Tate so popular with young men? With his sports cars and his obvious wealth, Tate has built a significant following out of his admittedly silly 'alpha male' rants. But behind the flashy lifestyle lies a web of controversy, includi...
•
Season 4
•
Episode 4
•
25:22

Social Media Fraud: Hushpuppi and the Designer Lifestyle
Instagram star Hushpuppi had over 2 million followers. With his amazing lifestyle filled with Ferraris and Rolls Royces and private jets, dressed head-to-toe in Gucci and Versace and Fendi, Hushpuppi seemed to have it all. But Hushpuppi's lifes...
•
Season 4
•
Episode 3
•
23:18

April Fool's Day Exclusive: The Blackberry at the End of the Universe
A Blackberry phone as a hacking tool?! For our April Fool's Day episode, we bring you an exclusive interview with hacking genius Dave the Barber, who leveraged a freak accident with a Blackberry into a hack that can compromise any device until ...
•
Season 4
•
Episode 2
•
9:40

Social Media Fraud: Fyre Festival
Want to hang out with supermodels on the beach? That's the dream that Billy McFarland sold in 2017 when he advertised Fyre Festival, an outdoor music concert in the Bahamas. Attendees were promised beautiful beaches, live music, comfy villas, g...
•
Season 4
•
Episode 1
•
28:46

Hacker, Broker, Scam: Following Stolen Data
When a scam caller knows everything about you--your address, social security number, bank account--how do they know? There isn't some super powerful hacker ring with its own call center. Your data is actually stolen at one end of the internet, ...
•
Season 3
•
Episode 19
•
23:04

AI Part 3: Tools, Technology, and Magical Connections
Let's explore the technology behind audio and music AI, and how it makes use of some cool math concepts to bring us convincing and realistic voices and music. Hear some actual AI-generated tunes, and find out how "latent space" changed the way ...
•
Season 3
•
Episode 18
•
27:54

Ross Ulbricht and Silk Road | Replay
Trump pardoned Ross Ulbricht after he served 12 years of his life sentence. In light of this news, we decided to replay our 2023 episode on the Silk Road website, which sold recreational drugs and other illegal items from 2011 to 2013. Was Trum...
•
Season 3
•
Episode 17
•
24:00

AI Part 2: Recognizing Scams
AI makes our lives more convenient in so many ways, but it also gives scammers the same conveniences. Host Michele Bousquet explains how scammers use AI audio, video, and text to better fool their victims.
•
Season 3
•
Episode 16
•
25:42
