Chrome is arguably more than a browser: With hundreds of millions of users, it’s a major platform that Web developers have to consider. In fact, with regular additions and changes, developers have to keep up to ensure they are taking advantage of everything available.
Chrome’s Developer Tools now make visual debugging easier by enabling developers to slow down playback of their animations on the fly, as you can see above. A new section also lets developers view Service Worker caches (just inspect a Service Worker at chrome://serviceworker-internals), meaning you no longer have to manually print out the contents to the console.
Other developer additions include:
- The new CSS value image-rendering: pixelated allows scaled images to appear to be composed of very large pixels, trading smooth results for faster image-scaling.
- CSS Media Queries now support any-pointer and any-hover, which function similarly to pointer and hover but can be triggered by any input device, not only the primary one.
- The Web Audio API now allows developers to temporarily suspend an AudioContext when it’s not in use, improving power consumption. StereoPannerNode is also now supported, enabling left-right panning of an incoming audio stream while maintaining equal power.
- HTTPS sites that have certificate chains using SHA-1 that are valid past January 1, 2017 will be treated as “affirmatively insecure” in Chrome’s interface as part of Google’s plan to gradually sunset SHA-1.
Chrome 41 also includes 51 security fixes, of which Google chose to highlight the following:
- [$7500] High CVE-2015-1212: Out-of-bounds write in media. Credit to anonymous.
- [$5000] High CVE-2015-1213: Out-of-bounds write in skia filters. Credit to cloudfuzzer.
- [$5000] High CVE-2015-1214: Out-of-bounds write in skia filters. Credit to cloudfuzzer.
- [$5000] High CVE-2015-1215: Out-of-bounds write in skia filters. Credit to cloudfuzzer.
- [$4000] High CVE-2015-1216: Use-after-free in v8 bindings. Credit to anonymous.
- [$3000] High CVE-2015-1217: Type confusion in v8 bindings. Credit to anonymous.
- [$3000] High CVE-2015-1218: Use-after-free in dom. Credit to cloudfuzzer.
- [$3000] High CVE-2015-1219: Integer overflow in webgl. Credit to Chen Zhang (demi6od) of NSFOCUS Security Team.
- [$3000] High CVE-2015-1220: Use-after-free in gif decoder. Credit to Aki Helin of OUSPG.
- [$2500] High CVE-2015-1221: Use-after-free in web databases. Credit to Collin Payne.
- [$2500] High CVE-2015-1222: Use-after-free in service workers. Credit to Collin Payne.
- [$2000] High CVE-2015-1223: Use-after-free in dom. Credit to Maksymillian Motyl.
-  High CVE-2015-1230: Type confusion in v8. Credit to Skylined working with HP’s Zero Day Initiative.
- [$2000] Medium CVE-2015-1224: Out-of-bounds read in vpxdecoder. Credit to Aki Helin of OUSPG.
- [$1000] Medium CVE-2015-1225: Out-of-bounds read in pdfium. Credit to cloudfuzzer.
- [$1000] Medium CVE-2015-1226: Validation issue in debugger. Credit to Rob Wu.
- [$1000] Medium CVE-2015-1227: Uninitialized value in blink. Credit to Christoph Diehl.
- [$1000] Medium CVE-2015-1228: Uninitialized value in rendering. Credit to miaubiz.
- [$500] Medium CVE-2015-1229: Cookie injection via proxies. Credit to iliwoy.
-  CVE-2015-1231: Various fixes from internal audits, fuzzing and other initiatives.
- Multiple vulnerabilities in V8 fixed at the tip of the 4.1 branch (currently 18.104.22.168).
If you add all those up, you’ll see Google spent $52,000 in bug bounties for this release. The security improvements alone should be enough for you to upgrade to Chrome 41.