That is a very good observation. It very well could be especially if you are on a wireless network. A common strategy during a MITM (man in the middle attack) is that s/he will be the go-between between you and the server.
When an SSL session is started, the MITM attacker can substitute the genuine SSL certificate of *.justhost.com with one that is self-signed by the attacker. The certificates are almost identical between the real site's ssl cert and the self-signed cert. However, the self-signed cert is not trusted by your browser although the information looks correct.
If you click "I trust this certificate" on the self-signed certificate, then the hacker will be able to see your info like username and passwords...bad news.