This is a generic name for attacks where the user is trying to be tricked to enter confidential information via email forms or fake web pages.
Typically these are attempts to get banking or credit card information.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
Detailed instructions for F-Secure security products are available in the documentation found in the Downloads section of our Home - Global site.
You may also refer to the Knowledge Base on the F-Secure Community site for further assistance.