9
Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
application programming interface and computer software code for anti-fraud protection, secure transaction protection and digital security; application programming interface and computer software code for detection, blocking, and remediation of malware, spy-ware, mitb, mitm, rootkits, bots, computer viruses, backdoors, zero-day attacks, phishing, sms grabbing, cyber-attacks, malicious attacks, mule accounts, application modification, and advanced threats; computer software code for identifying and preventing fraudulent attacks on and intrusions in computers, computer systems, networks, software applications, digital devices, and mobile devices; application programming interface and computer software code for providing secure networks, virtual computer systems and virtual computer environments
42
Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
technical support and consulting services related to anti-fraud protection, secure transaction protection, digital security and cyber-attacks against computers, computer systems, networks, software applications, digital devices, and mobile devices; technical and consulting services related to design, development, customization, installation, maintenance, repair and management of anti-fraud and digital security systems for others; cloud computing services featuring software for use in security and protection, prevention and mitigation of fraudulent attacks on computers, computer systems, networks, software applications, digital devices, and mobile devices