Authors - Masakona Wavhothe, Khutso Lebea Abstract - This paper focuses on the vulnerabilities present in Bluetooth Low Energy (BLE) Beacons by exploring the background of BLE technology and the need to explore the chosen topic. The problem statement and structure of the paper are also explored in the introductory section. The subsequent section covers the case study that will be used to explore the chosen topic in deeper detail. Then, the background explores BLE beacons in detail, explaining their applications and vulnerabilities. The paper then concludes by highlighting all the important facts established in the research and suggesting how the study can be improved.