NexTech Batteries, the global leader in proprietary lithium-sulfur (LiS) battery technology, received UN/DOT 38.3.5 safety certification for its patented semi-solid-state lithium-sulfur 5.4 amp hour cell – exceeding test standards required for air transportation and other modes of transit.
Before any lithium battery can be transported, it must pass specialized safety tests that simulate real-world transportation conditions like low pressure, impact, temperature, shock and more. UN/DOT 38.3.5 details environmental, mechanical and electrical requirements for all lithium cells and batteries. The UN/DOT 38.3.5 standard is required for transporting lithium batteries in the U.S. and is the international standard for air and sea transit across international waters and boundaries. With this certification, NexTech demonstrates compliance in the design and manufacture of its groundbreaking Lithium-Sulfur battery cells – which are being actively tested by major global automotive manufacturers, state energy commissions in the U.S. and consumer technology companies.
NexTech’s first-to-market semi-solid-state lithium-sulfur chemistry brings real solutions to the immense demands of the world economy for reliable, powerful, safe and sustainable battery technology. Having introduced a lithium-sulfur cell approved under the UN 38.3.5 safety standard, the first of its battery cells to earn the certification, NexTech is ramping up activity with domestic and international partners and rapidly preparing additional cell capacities for UN/DOT testing. The company is accelerating the crucial battery evolution demanded by the next generation of consumer electronics and e-mobility.
NexTech Lithium-Sulfur Cells: Flying Through UN 38.3.5 Safety Tests
- T1 Altitude – simulates how the cell behaves during air transport under low pressure conditions whereby the cell could swell in size or burst.
- T2 Thermal – validates the cell’s perimeter vacuum seal and internal electrical connections to remain intact during rapid and extreme temperature changes.
- T3 Vibration – that simulates a series of vibration effects that may be apparent during transportation.
- T4 Shock – validates the robustness of the cells against shock and extreme acceleration and deceleration that can be transportation or application related.
- T5 External Short Circuit – simulates an external short of the terminals without going into thermal runaway or exceeding 170C and avoiding rupture.
- T6 Crush/Impact – simulates any mechanical abuse from an impact or crushing event that may result in thermal runaway or the cell bursting.
- T8 Forced Discharge – evaluates the ability of a primary or rechargeable cell to withstand a forced discharge condition and not result in thermal runaway.







Guest Post: Trojans Targeting Mobile Banking Grew By Over 110% In H1 2022
Posted in Commentary with tags Atlas VPN on September 22, 2022 by itnerdThe majority of the population in developed countries has integrated mobile banking into their everyday lives surprisingly quickly and seamlessly. The adoption of mobile banking was successful because financial institutions and fintechs ensured that the applications were user-friendly, convenient, and extremely secure.
However, since financial gains from finding loopholes in mobile banking applications tend to be sky-high, hackers are working day and night to figure out how to break into these apps.
While the mobile banking industry is in its golden age, the amount of attention from cybercriminals is also at an all-time high.
According to Atlas VPN investigation, the number of mobile banking trojans reached a record-breaking 109,561 detections in H1 2022, representing a 117% increase over the 50,450 detections in H2 2021.
The data for the analysis was extracted from Kaspersky’s official website, where the company shares data collected from its users.
Nearly half (49.28%) of the detections in H1 2022 were part of the Trojan-Banker.AndroidOS.Bray family. This malware type is considered to be a severe threat to the infected system.
Mobile trojans are designed to target mobile financial applications in order to commit on-device fraud and siphon cash straight from victims’ accounts.
Victims (sometimes) get their funds back
Cybercriminals tend to backward-rationalize their fraudulent acts by stating that their victims usually get their funds back, so the actual losses are incurred by the banking institutions instead.
To read the full article, head over to: https://atlasvpn.com/blog/trojans-targeting-mobile-banking-grew-by-over-110-in-h1-2022
Leave a comment »