More info is at http://support.google.com/webmasters/bin/answer.py?hl=en&... and by doing a [site:google.com malware review] search, but it looks like you've requested the malware review correctly. In the mean time, I'd just double-check for any way that malware could have been included/downloaded on the pages.
If TheVerge can take it... just refer to the local addresses. Shove a Varnish instance in front to help if you fear for the web servers.
Might just be because they're on sbnation, but there ya go.
Buying ads on large sites with lax controls is a very common and simple way to distribute trojans.
Something nasty must've gotten onto their CDN, but it wasn't necessarily from The Verge - since they operate a significant amount of websites - it's just that The Verge was using their parent company's resources.
I would try setting a new hostname for the cdn content servers and see if that works. Assuming of course they have gotten rid of the malware.
Edit: Firefox provides these links in the form of a button labeled "Why was this page blocked?"
I appreciate it when people provide links to such previous submissions.
Better that than the trend of people posting duplicate content.
And with that said, I think I'm done with this meta-discussion. Thanks for playing…