Found this interesting effect when googling the terms “browser games”:
Infection Details
URL: htXp://liamkincaid.com.sapo.pt/template/feathead.jpg
Process: C:\Documents and Settings\riotamot\Local… i[/i]
Infection: URL:Mal
Running Win XP 32-bit with avast! Free:
Def: 120722-0
Prg: 7.0.1456
With avast! WebRep (allowed in incognito mode)
Have tested to google “browser” and “games” by themselves, and a couple of random queries as well. Have replicated googling for “browser games” four times, and avast! blocks the .JPG above every search. Dunno if it’s a false positive or not. Would be horrible if it’s a true positive
I apologise, I’m not experienced with these things, and cannot interpret these results thoroughly. A previous .JPG within this domain was infected with executable code. Dependant on what engine reading this .JPG, the machine might or might not execute it, thus being infected.
But does this effectually mean that Google search results (and syndicated feeds) may infect a client, if they retrieve the image file directly from the malware site (ie. not creating a thumbnail or equivalent of said image)?
You can a virus from what you believe to be a jpg file. All it needs is a double click to activate whenever you have been infected by a virus that attach itself to jpg files to make them executable, and you also have a doubtful viewer executable from that malware,