Tools and techniques are provided for detecting a particular type of
spyware. Network activities and user update activities are monitored
automatically, and the results are analyzed to identify related processes
which perform network transmissions without performing substantive user
updates. These processes are identified to a user and/or an administrator
as potential spyware, and are then quarantined or otherwise handled based
on instructions received from the user or administrator. In some cases,
the monitoring and analysis begins with selection of a group of processes
to monitor, while in other cases it begins with monitoring of network
and/or user update activities in order to narrow the group of suspect
processes. Devices, configured media, and method products are also
described.